Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID

被引:7
作者
Xiao, Meihua [1 ]
Li, Wei [1 ,2 ]
Zhong, Xiaomei [1 ]
Yang, Ke [1 ]
Chen, Jia [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
[2] CRRC Zhuzhou Locomot CO Ltd, Prod Dev Ctr, Zhuzhou 412001, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptographic protocols; formal verification; performance evaluation; protocols; radiofrequency identification; recursive functions; telecommunication security; ubiquitous computing; formal analysis; typical UMAPs; RAPP; protocol abstract modeling method; G-UMAP; patching scheme; improved protocol; SPIN verification; improved RCIA; similar UMAP analyzing; ultralightweight mutual authentication protocols; RFID; Radio frequency identification systems; malicious attack; UMAP; RCIA; Key synchronization patching scheme; Model checking; ATTACK;
D O I
10.1049/cje.2019.06.022
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ultralightweight mutual authentication protocols (UMAP) of Radio frequency identification (RFID) systems have attracted much attention from researchers. Many studies reveal that most of UMAP suffer malicious attack. To improve security of UMAP, formal analysis is performed with Simple promela interpreter (SPIN). Two typical UMAPs, which are RCIA and RAPP, are selected as our case study. A protocol abstract modeling method is presented to make UMAP can be formalized simply. Using SPIN, verification results show that RCIA and RAPP are both vulnerable against desynchronization attack. A Generalized model of UMAP (G-UMAP) and a general patching scheme are presented for resisting the attack. To validate the patching scheme, formal verification is then performed for the improved protocol. SPIN verification shows that the improved RCIA and RAPP both gain higher security. The above proposed modeling method has great significance for similar UMAP analyzing, and the proposed patching scheme is proved to be practical and reliable.
引用
收藏
页码:1025 / 1032
页数:8
相关论文
共 25 条
  • [1] Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
    Ahmadian, Zahra
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (07) : 1140 - 1151
  • [2] Desynchronization attack on RAPP ultralightweight authentication protocol
    Ahmadian, Zahra
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    [J]. INFORMATION PROCESSING LETTERS, 2013, 113 (07) : 205 - 209
  • [3] [Anonymous], THESIS
  • [4] A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol
    Barrero, David F.
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Camacho, David
    R-Moreno, Maria D.
    [J]. EXPERT SYSTEMS, 2014, 31 (01) : 9 - 19
  • [5] Bilal Z., 2015, APPL MATH INFORM SCI, V9, P561
  • [6] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
    Bruce, Ndibanje
    Kim, HyunHo
    Kang, Young Jin
    Lee, Young Sil
    Lee, Hoon Jae
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
  • [7] A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
    Cai Qingling
    Zhan Yiju
    Wang Yonghua
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 449 - 453
  • [8] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [9] The model checker SPIN
    Holzmann, GJ
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (05) : 279 - 295
  • [10] Security analysis of LMAP using AVISPA
    Islam, Salekul
    [J]. International Journal of Security and Networks, 2014, 9 (01) : 30 - 39