An Enhanced Authentication Protocol for RFID Systems

被引:23
作者
Hosseinzadeh, Mehdi [1 ,2 ]
Ahmed, Omed Hassan [3 ]
Ahmed, Sarkar Hasan [4 ]
Trinh, Cuong [5 ]
Bagheri, Nasour [6 ,7 ]
Kumari, Saru [8 ]
Lansky, Jan [9 ]
Huynh, Bao [10 ]
机构
[1] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[2] Iran Univ Med Sci, Hlth Management & Econ Res Ctr, Tehran 1666887635, Iran
[3] Univ Human Dev, Dept Informat Technol, Sulaymaniyah 00964, Iraq
[4] Sulaimani Polytech Univ, Network Dept, Sulaymaniyah 46001, Iraq
[5] Ton Duc Thang Univ, Fac Informat Technol, Artificial Intelligence Lab, Ho Chi Minh City 700000, Vietnam
[6] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[7] Inst Res Fundamental Sci IPM, Sch Comp Sci SCS, Farmanieh Campus, Tehran 1953833511, Iran
[8] Chaudhary Charm Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[9] Univ Finance & Adm, Fac Econ Studies, Dept Comp Sci & Math, Prague 10100, Czech Republic
[10] Ho Chi Minh City Univ Technol HUTECH, Fac Informat Technol, Ho Chi Minh City 700000, Vietnam
关键词
IoT; RFID; mutual authentication; security analysis; desynchronization; traceability; impersonation; real-or-random model; SECURITY; TAXONOMY; SCHEME; IOT;
D O I
10.1109/ACCESS.2020.3008230
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyse the security of two mutual authentication protocols that have been recently proposed by Gao et al. (IEEE Access, 7:8376-8384, 2019), a hash-based protocol and a Rabin public key based protocol. Our security analysis clearly shows important security pitfalls in these schemes. More precisely, in each protocol, we introduce efficient approaches to desynchronize the tag and the reader/server. The proposed attacks are almost deterministic and the complexity of each attack is a session for the hash-based and three sessions for Rabin public key based protocol. In addition, in the case of the hash-based protocol, we extend the proposed desynchronization attack to a traceability attack in which the adversary can trace any given tag based on the proposed attack with probability of almost one. In the case of Rabin public key based protocol, we extend the proposed desynchronization attack to a tag impersonation attack with the success probability of one. Besides, we propose an enhanced version of the Rabin public key based protocol to provide a secure authentication between the tag and the reader. We evaluate the security of the proposed protocol formally using the Scyther tool and also in Real-or-Random model.
引用
收藏
页码:126977 / 126987
页数:11
相关论文
共 26 条
[11]   A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems [J].
Doss, Robin ;
Sundaresan, Saravanan ;
Zhou, Wanlei .
AD HOC NETWORKS, 2013, 11 (01) :383-396
[12]   Authentication Protocols for Internet of Things: A Comprehensive Survey [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros A. ;
Janicke, Helge ;
Jiang, Jianmin ;
Shu, Lei .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[13]  
Galbraith S., TECH REP
[14]   Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol [J].
Gao, Lijun ;
Zhang, Lu ;
Lin, Feng ;
Ma, Maode .
IEEE ACCESS, 2019, 7 :8376-8384
[15]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
[16]   A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification [J].
Zhou, Jingxian .
Journal of Communications, 2015, 10 (02) :117-123
[17]  
Markit I., 2017, INTERNET THINGS MOVE, V28
[18]  
Markit I., 2020, NUMBER CONNECTED IOT
[19]  
Presser M., 2009, EURESCOM MESS GE MAG, V2
[20]   An Application Domain-Based Taxonomy for IoT Sensors [J].
Rozsa, Vitor ;
Denisczwicz, Marta ;
Dutra, Moises ;
Ghodous, Parisa ;
da Silva, Catarina Ferreira ;
Moayeri, Nader ;
Biennier, Frederique ;
Figay, Nicolas .
TRANSDISCIPLINARY ENGINEERING: CROSSING BOUNDARIES, 2016, 4 :249-258