Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud

被引:1
作者
Lee, Cheng-Chi [1 ]
Chen, Shun-Der [1 ]
Li, Chun-Ta [2 ]
Cheng, Chung-Lun [1 ]
Lai, Yan-Ming [3 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei 24205, Taiwan
[2] Tainan Univ Technol, Dept Informat Management, Tainan, Taiwan
[3] Taiwan Natl Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018) | 2018年
关键词
Authentication; Cloud computing; Ownership transfer; Quadratic residue; RFID; QUADRATIC RESIDUES; AUTHENTICATION; SCHEME; IMPROVEMENT; PRIVACY;
D O I
10.1109/CSCloud/EdgeCom.2018.00032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the advancement of modern technology, the era of Internet of Things (IoT) has come with cloud computing going on thriving, which has brought more and more attention to Radio Frequency Identification (RFID), as RFID is key to the sensor technology in IoT. In 2016, Cao et al. proposed an ingenious RFID ownership transfer protocol based on cloud. However, we shall point out that the proposed scheme is vulnerable to some security weaknesses such as the desynchronization attack as well as the tag impersonation attack and a tendency towards plaintext miscalculations. In the future, anyone can propose an improved scheme to remedy these security weaknesses.
引用
收藏
页码:134 / 139
页数:6
相关论文
共 50 条
[31]   TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer [J].
Xie, Wei ;
Xie, Lei ;
Zhang, Chen ;
Wang, Qiang ;
Wang, Chao ;
Tang, Chaojing .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) :934-944
[32]   Secure Group Ownership Transfer Protocol for Tags in RFID System [J].
He, Lei ;
Gan, Yong ;
Yin, Yi-feng .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03) :21-30
[33]   RFID Tag Ownership Transfer Protocol for A Closed Loop System [J].
Al Gaith, K. D. ;
Ray, Biplob Rakshit ;
Chowdhury, Morshed .
2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014), 2014, :575-579
[34]   RFID Multi-Ownership Transfer Protocol in VMI Environments [J].
Lo, Nai-Wei ;
Wang, I-Fan ;
Chuang, Yo-Hsuan .
RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY, 2014, 12 :51-66
[35]   Secure multiple group ownership transfer protocol for mobile RFID [J].
Yang, Ming Hour .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2012, 11 (04) :361-373
[36]   An efficient RFID authentication protocol supporting tag ownership transfer [J].
Jialiang, He ;
Dantong, Ouyang ;
Youjun, Xu ;
Yu, Shang .
International Journal of Advancements in Computing Technology, 2012, 4 (04) :244-253
[37]   Security Analysis of an Ownership Transfer Protocol [J].
Ghadim, Gelare Oudi ;
Moazami, Farokhlagha ;
Oskuiee, Shabnam Saderi .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (06) :1-11
[38]   Secure Mobile RFID Ownership Transfer Protocol to Cover all Transfer Scenarios [J].
Ray, Biplob R. ;
Chowdhury, Morshed ;
Abawajy, Jemal .
2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, :1185-1192
[39]   Mobile RFID mutual authentication and ownership transfer [J].
Luo, Jia Ning ;
Yang, Ming Hour .
International Journal of Advancements in Computing Technology, 2012, 4 (07) :28-40
[40]   Scalable RFID security protocols supporting tag ownership transfer [J].
Song, Boyeon ;
Mitchell, Chris J. .
COMPUTER COMMUNICATIONS, 2011, 34 (04) :556-566