Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce

被引:24
作者
Aghili, Seyed Farhad [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
impersonation; mobile commerce; secret disclosure; RFID; ultra-lightweight; CRYPTANALYSIS; DEVICES; SASI;
D O I
10.1002/dac.3837
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, many people perform their commercial activities, such as electronic payment and electronic banking, through their mobile phones. Mobile commerce (m-commerce) refers to manipulating electronic commerce (e-commerce) by using mobile devices and wireless networks. Radio-frequency identification (RFID) is a technology which can be employed to complete payment functions on m-commerce. As an RFID subsystem is applied in m-commerce and supply chains, the related security concerns are very important. Recently, Fan et al. have proposed an ultra-lightweight RFID authentication scheme for m-commerce (ULRAS) and claimed that their protocol is efficient enough and provides a high level of security. In this paper, we show that their protocol is vulnerable to secret disclosure and reader impersonation attacks. Finally, we improve it to a protocol that is resistant to the attacks presented in this paper and the other known attacks in the context of RFID authentication. We further analyze the security of the improved protocol through the Burrows-Abadi-Needham logic (BAN-logic). Moreover, our proposed improvement does not impose any additional workload on the RFID tag.
引用
收藏
页数:12
相关论文
共 29 条
[1]  
Aghili S. F., 2013, LECT NOTES COMPUTER, V8262, P86
[2]   Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol [J].
Bilal, Zeeshan ;
Masood, Ashraf ;
Kausar, Firdous .
2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, :260-267
[3]   HB++:: a lightweight authentication protocol secure against some attacks [J].
Bringer, Julien ;
Chabanne, Herve ;
Dottax, Emmanuelle .
SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, :28-+
[4]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[5]   Security Analysis of the SASI Protocol [J].
Cao, Tianjie ;
Bertino, Elisa ;
Lei, Hong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) :73-77
[6]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[7]  
Fan K, 2016, PEER PEER NETW APPL, P1
[8]  
Gilbert H., 2005, 2005237 CRYPT EPRINT
[9]  
Hopper N.J., 2001, Advances in Cryptology - ASIACRYPT 2001, P52, DOI DOI 10.1007/3-540-45682-1
[10]   Security analysis of LMAP using AVISPA [J].
Islam, Salekul .
International Journal of Security and Networks, 2014, 9 (01) :30-39