共 51 条
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments
被引:14
作者:
Trinh, Cuong
[1
]
Huynh, Bao
[2
]
Lansky, Jan
[3
]
Mildeova, Stanislava
[4
]
Safkhani, Masoumeh
[4
]
Bagheri, Nasour
[5
,6
]
Kumari, Saru
[7
]
Hosseinzadeh, Mehdi
[8
,9
]
机构:
[1] Ton Duc Thang Univ, Fac Informat Technol, Artificial Intelligence Lab, Ho Chi Minh City 700000, Vietnam
[2] Ho Chi Minh City Univ Technol HUTECH, Fac Informat Technol, Ho Chi Minh City 70000, Vietnam
[3] Univ Finance & Adm, Fac Econ Studies, Dept Comp Sci & Math, Prague 10100, Czech Republic
[4] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran 1678815811, Iran
[5] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[6] Inst Res Fundamental Sci IPM, Sch Comp Sci SCS, Farmanieh Campus, Tehran 1953833511, Iran
[7] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[8] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[9] Iran Univ Med Sci, Hlth Management & Econ Res Ctr, Tehran 1666887635, Iran
来源:
IEEE ACCESS
|
2020年
/
8卷
关键词:
Protocols;
Radiofrequency identification;
Authentication;
Electronic mail;
Ciphers;
Economics;
Internet of Things (IoT);
mutual authentication;
security analysis;
lightweight protocol;
GNY logic;
scyther;
FORMAL ANALYSIS;
SECURITY;
CRYPTANALYSIS;
DEVICES;
SCHEME;
TOOL;
D O I:
10.1109/ACCESS.2020.3021701
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
The communication security of constrained objects such as radio frequency identification (RFID) tags and wireless sensor network (WSN) is very challenging because it is not always possible to use the conventional on-the-shelf solutions for them, due to their limited available power and computational capabilities. To deal with this demand, many security protocols have been developed by the researchers so far. However, in many cases, the later analyses that have been carried out on these protocols have shown that they are vulnerable to one or few attacks, which could be enough to eliminate any application for such protocols. Following this direction, in this article, we analyze the security of four recent ultra-lightweight/lightweight protocols, by presenting important attacks including secret disclosure attack and desynchronization attack against them. To address the shortcoming of the previous protocols, we present a new security protocol based on lightweight block ciphers name it LBCbAP. In this protocol, we use CRAFT as the core security primitive. CRAFT is a tweakable block cipher which has been recently proposed and independent security analysis confirmed its security. Our detailed security analysis of LBCbAP, which is performed both informally and formally through the GNY logic and the Scyther tool, demonstrates its security against various types of attacks including secret disclosure and desynchronization attacks. The cost analysis of the designed protocol and comparison with the related lightweight protocols show that LBCbAP is cost efficient.
引用
收藏
页码:165536 / 165550
页数:15
相关论文