Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols

被引:0
|
作者
Süleyman Kardaş
Ziya Alper Genç
机构
[1] Batman University,Faculty of Engineering and Architecture
[2] University of Luxembourg,undefined
来源
关键词
RFID; Security; EPC global; Chaotic map;
D O I
暂无
中图分类号
学科分类号
摘要
Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis of these protocols and uncover their weaknesses. We prove that these protocols are vulnerable to tag tracing, tag impersonation and de-synchronization attacks. The attack complexity of an adversary is polynomial and the success probability of these attacks are substantial. Moreover, we also propose an improved RFID authentication protocol that employs Chebyshev chaotic maps and complies with the EPC global Class 1 Generation 2 standard. Finally, we show that our protocol is resistant against those security issues.
引用
收藏
页码:1135 / 1154
页数:19
相关论文
共 50 条
  • [1] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Kardas, Suleyman
    Genc, Ziya Alper
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1135 - 1154
  • [2] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040
  • [3] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Journal of Medical Systems, 2013, 37
  • [4] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
  • [5] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhihua Zhang
    Huanwen Wang
    Yanghua Gao
    Personal and Ubiquitous Computing, 2015, 19 : 1053 - 1061
  • [6] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhang, Zhihua
    Wang, Huanwen
    Gao, Yanghua
    PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) : 1053 - 1061
  • [7] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    Journal of Medical Systems, 2021, 45
  • [8] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder, Dharminder
    Kundu, Nibedita
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2021, 45 (08)
  • [9] Security analysis and application of Chebyshev Chaotic map in the authentication protocols
    Dharminder D.
    Gupta P.
    Dharminder, Dharminder (manndharminder999@gmail.com), 1600, Taylor and Francis Ltd. (43): : 1095 - 1103
  • [10] ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX
    Wang Shaohui
    Liu Sujuan
    JournalofElectronics(China), 2013, 30 (01) : 33 - 39