Weaknesses of fingerprint-based mutual authentication protocol

被引:0
作者
Picazo-Sanchez, Pablo [1 ]
Ortiz-Martin, Lara [1 ]
Peris-Lopez, Pedro [1 ]
Bagheri, Nasour [2 ]
机构
[1] Univ Carlos III Madrid, COSEC Lab, Dept Comp Sci, E-28903 Getafe, Spain
[2] Shahid Rajaee Teachers Training Univ, Dept Elect Engn, Tehran, Iran
关键词
ubiquitous computing; sensors; security; BAN logic; INTERNET;
D O I
10.1002/sec.1161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is an emerging paradigm, which is used to link physical objects with Internet. One of the most common ways of communicating and identifying objects on Internet of Things is using Radio Frequency IDentification (RFID) systems between different objects. Researchers have focused on developing improvements of RFID authentication protocols that stave off privacy threats and well-known security problems. Recently, Khor et al. have proposed a new authentication protocol that conforms to the Electronic Product Code Class-1 Generation-2 standard (ISO/IEC 18000-6C for RFID systems). In this paper, we show the vulnerabilities of this authentication protocol concerning to full disclosure, impersonation, traceability, de-synchronization, and Denial-of-Service attacks. These attacks make the protocol unfeasible to introduce it with an adequate security and sufficient privacy protection level. Finally, we present a new protocol, called Fingerprint(+) protocol, which is based on ISO/IEC 9798-2 and ISO/IEC 18000-6C and whose security is formally verified using BAN logic. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2124 / 2134
页数:11
相关论文
共 35 条
[1]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[2]  
Avoine Gildas, 2012, Data Privacy Management and Autonomous Spontaneus Security. 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011. Revised Selected Papers, P1, DOI 10.1007/978-3-642-28879-1_1
[3]  
Azuara G, 2011, LECT NOTES COMPUT SC, V6694, P168, DOI 10.1007/978-3-642-21323-6_21
[4]  
Benelli G., 2009, P 2 INT C HLTH, P58
[5]  
Blanchet B, 2014, AUTOMATIC VERIFICATI
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]   Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection [J].
Chen, Chin-Ling ;
Deng, Yong-Yuan .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2009, 22 (08) :1284-1291
[8]   Authenticated RFID security mechanism based on chaotic maps [J].
Cheng, Zi-Yao ;
Liu, Yun ;
Chang, Chin-Chen ;
Chang, Shih-Chang .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) :247-256
[9]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[10]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259