Simulation-Based Traceability Analysis of RFID Authentication Protocols

被引:17
作者
Alagheband, Mahdi R. [1 ]
Aref, Mohammad R. [2 ]
机构
[1] Islamic Azad Univ, Dept Elect Engn, Shahre Rey Branch, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur ISSL Lab, Tehran, Iran
关键词
RFID systems; Privacy models; Authentication protocol; Traceability; MUTUAL AUTHENTICATION; PRIVACY;
D O I
10.1007/s11277-013-1552-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays low-cost RFID systems have moved from obscurity into mainstream applications which cause growing security and privacy concerns. The lightweight cryptographic primitives and authentication protocols are indispensable requirements for these devices to grow pervasive. In recent years, there has been an increasing interest in intuitive analysis of RFID protocols. This concept has recently been challenged by formal privacy models. This paper investigates how to analyse and solve privacy problems in formal model. First, we highlight some vague drawbacks especially in forward and backward traceability analysis and extend it in the simulation-based privacy model family. Then, the privacy weaknesses of three new-found RFID authentication protocols are analysed in formal privacy models and three improved protocols are proposed to prevent the aforementioned attacks.
引用
收藏
页码:1019 / 1038
页数:20
相关论文
共 39 条
[1]  
Akgün M, 2011, LECT NOTES COMPUT SC, V6710, P239, DOI 10.1007/978-3-642-22444-7_16
[2]  
[Anonymous], 2008, P 2008 ACM S INFORM
[3]   Impossibility results for RFID privacy notions [J].
Armknecht F. ;
Sadeghi A.-R. ;
Scafuro A. ;
Visconti I. ;
Wachsmann C. .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6480 (PART 2) :39-63
[4]  
Armknecht F, 2010, LECT NOTES COMPUT SC, V6123, P493, DOI 10.1007/978-3-642-13708-2_29
[5]  
Avoine G, 2006, LECT NOTES COMPUT SC, V3897, P291
[6]  
Avoine G., 2005, THESIS EPFL
[7]  
Avoine G, 2005, 2005049 CRYPT EPRINT
[8]  
Avoine G, 2010, LECT NOTES COMPUT SC, V6370, P138, DOI 10.1007/978-3-642-16822-2_13
[9]  
Canard S., 2010, 2010 IEEE International Conference on RFID-Technology and Applications (RFID-TA), P269, DOI 10.1109/RFID-TA.2010.5529920
[10]  
Chai Q., 2012, THESIS U WATERLOO