Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol

被引:0
作者
Li, Jing [1 ]
Zhou, Zhiping [1 ]
Wang, Ping [1 ]
机构
[1] Jiangnan Univ, Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
来源
2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC) | 2017年
基金
中国国家自然科学基金;
关键词
RFID; forward privacy; backward privacy; Ouafi-Phan privacy model; GNY logic; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through analyzing the security of LMAP protocol, we point out that this protocol is vulnerable to several attacks including the data integrity, reader impersonation and traceability, forward traceability. Based on the above security drawbacks, an improved LAMP protocol is proposed. Aiming at the problem of data integrity, the backend server uses message authentication code to encrypt data information of tag; the reader mixes message generated by tag side to ensure resist impersonation reader attack; the tag side introduces blind factor against traceability attack; in addition, the keys of tags and backend server side can be updated dynamically according to the random number generated by tag side in different authentication cycles, to ensure the forward/backward privacy. The formal proof of correctness of the improved protocol is given based on GNY logic, and shows that the improved protocol resists various attack.
引用
收藏
页码:7292 / 7297
页数:6
相关论文
共 50 条
  • [41] Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
    Abyaneh, Mohammad Reza Sohizadeh
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 92 - 103
  • [42] A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
    Cao, Xiaolin
    O'Neill, Maire
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 287 - 292
  • [43] Low-Cost Untraceable Authentication Protocols for RFID
    Lee, Yong Ki
    Batina, Lejla
    Singelee, Dave
    Verbauwhede, Ingrid
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 55 - 64
  • [44] A Survey on Low-cost RFID Authentication Protocols
    Syamsuddin, Irfan
    Han, Song
    Dillon, Tharam
    2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2012, : 77 - 82
  • [45] A lattice based authentication for low-cost RFID
    El Moustaine, Ethmane
    Laurent, Maryline
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [46] Cryptanalysis of A New Lightweight RFID Mutual Authentication Protocol with Cache in Reader for IoT
    Yin, Yifeng
    Xu, Mingming
    Zhang, Qing
    Chen, Jianhua
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 909 - 913
  • [47] Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
    Safkhani, Masoumeh
    Pens-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Bagheri, Nasour
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 571 - 577
  • [48] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System
    He Lei
    Lu Xin-mei
    Jin Song-he
    Cai Zeng-yu
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272
  • [49] A secure search protocol for lightweight and low-cost RFID systems
    Mojtaba Eslamnezhad Namin
    Mehdi Hosseinzadeh
    Nasour Bagheri
    Ahmad Khademzadeh
    Telecommunication Systems, 2018, 67 : 539 - 552
  • [50] Mutual authentication protocol for low cost passive tag in RFID system
    Kumar A.
    Jain A.K.
    International Journal of Information Technology, 2021, 13 (3) : 1209 - 1215