DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT

被引:23
作者
Aghili, Seyed Farhad [1 ]
Ashouri-Talouki, Maede [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Dept Informat Technol Engn, Hezar Jerib St, Esfahan 8174673441, Iran
关键词
RFID; Authentication; DoS attack; Impersonation; De-synchronization; Compromised reader; SECURITY;
D O I
10.1007/s11227-017-2139-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, RFID (radio-frequency identification) systems are widely used in many applications. One of the most important applications for this technology is the Internet of things (IoT). Therefore, researchers have proposed several authentication protocols that can be employed in RFID-based IoT systems, and they have claimed that their protocols can satisfy all security requirements of these systems. However, in RFID-based IoT systems we have mobile readers that can be compromised by the adversary. Due to this attack, the adversary can compromise a legitimate reader and obtain its secrets. So, the protocol designers must consider the security of their proposals even in the reader compromised scenario. In this paper, we consider the security of the ultra-lightweight RFID mutual authentication (ULRMAPC) protocol recently proposed by Fan et al. They claimed that their protocol could be applied in the IoT systems and provide strong security. However, in this paper we show that their protocol is vulnerable to denial of service, reader and tag impersonation and de-synchronization attacks. To provide a solution, we present a new authentication protocol, which is more secure than the ULRMAPC protocol and also can be employed in RFID-based IoT systems.
引用
收藏
页码:509 / 525
页数:17
相关论文
共 35 条
  • [1] Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
    Akgun, Mete
    Caglayan, M. Ufuk
    [J]. 2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, : 648 - 653
  • [2] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) : 4281 - 4294
  • [3] An R., 2016, INT C BROADB WIR COM, P857
  • [4] [Anonymous], 2010, RFID HDB FUNDAMENTAL, DOI [DOI 10.1002/9780470665121, 10.1002/9780470665121]
  • [5] Avoine G, 2009, LECT NOTES COMPUT SC, V5932, P36, DOI 10.1007/978-3-642-10838-9_4
  • [6] Security enhancement of the authenticated RFID security mechanism based on chaotic maps
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2356 - 2372
  • [7] ECC-based untraceable authentication for large-scale active-tag RFID systems
    Chen, Yalin
    Chou, Jue-Sam
    [J]. ELECTRONIC COMMERCE RESEARCH, 2015, 15 (01) : 97 - 120
  • [8] Authenticated RFID security mechanism based on chaotic maps
    Cheng, Zi-Yao
    Liu, Yun
    Chang, Chin-Chen
    Chang, Shih-Chang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 247 - 256
  • [9] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [10] Chin-Ling Chen, 2010, Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010), P423, DOI 10.1109/BWCCA.2010.108