Computer Science ›› 2013, Vol. 40 ›› Issue (11): 103-107.

Previous Articles     Next Articles

Lightweight Authentication Protocol for RFID Based on Model of Untraceability

CHEN Xiu-qing,CAO Tian-jie and GUO Yu   

  • Online:2018-11-16 Published:2018-11-16

Abstract: We analyzed the security of RFID authentication protocols recently proposed by Ha et al.Our security analysis clearly highlights important security weakness in this article.More precisely,an adversary analyzes the messages between reader and tag and implements traceability attacks.Then,the adversary performs the passive full-disclosure attacks and discloses the tags’ secret.In order to evaluate the performance of traceability attacks,we observed the toy experimental results by running several tests on an implementation of the protocol.Finally,we used the formal model of untraceability,which successfully proves the robustness against tracing attacks and the untraceability of the enhanced scheme.

Key words: RFID authentication protocols,Traceability attack,Formal model of untraceability

[1] 史艳伟,张岩庆,刘克胜.基于RFID系统的安全性问题研究[J].计算机科学,2012,9(6A):214-216
[2] Avoine G,Carpent X,Martin B.Privacy-friendly synchronized ultralightweight authentication protocols in the storm [J].Journal of Network and Computer Applications,2012,35(2):826-843
[3] Ha J,Moon S,Nieto J M G,et al.Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP) [M].Emerging Technologies in Knowledge Discovery and Data Mining.Springer,2007:574-583
[4] Thompson D R,Chaudhry N,Thompson C W.RFID securitythreat model[C]∥Proceedings of the Conf on Applied Research in Information Technology.2006
[5] 梁昌勇,陆鑫,俞家文,等.基于云计算的供应链RFID信息服务研究[J].计算机应用研究 ,2011,8(9):3375-3380
[6] 邓淼磊,朱昭,石金娥,等.RFID标签的不可追踪性[J].北京邮电大学学报,2010,3(2):44-47
[7] 李慧贤.轻量级RFID双向认证协议设计与分析[J].西安电子科技大学学报:自然科学版,2012,9(1):172-178
[8] Ton V D,Sjouke M,Saˇsa R.Untraceability of RFID protocols [M].Information Security Theory and Practices Smart Devices,Convergence and Next Generation Networks.Springer,2008:1-15
[9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.M2AP:a minimalist mutual-authentication protocol for low-cost RFID tags[C]∥Ma J,Jin H,Tianruo Yang L,Tsai JJP,eds.International conference on ubiquitous intelligence and computing—UIC’06.Lecture notes in computer science,vol.4259.Wuhan and Three Gorges,China:Springer,2006:912-23
[10] Phan R-W.Cryptanalysis of a new ultralightweight RFID au-thentication protocol—SASI [J]. IEEE Transactions on Dependable and Secure Computing,2009,6(4):316-320
[11] Hernandez-Castro J C,Peris-Lopez P,Phan R C-W,et al.Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol [M].Radio Frequency Identification:Security and Privacy Issues.Springer,2010:22-34
[12] Peris-Lopez P,Hernandez-Castro J C,Phan R C-W,et al.Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol [C]∥Proceedings of the Information Security and Cryptology.2011
[13] Yeh K-H,Lo N,Winata E.An efficient ultralightweight authentication protocol for RFID systems [J].Proc of RFIDSec Asia,2010,0:49-60

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!