Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols

被引:0
|
作者
Süleyman Kardaş
Ziya Alper Genç
机构
[1] Batman University,Faculty of Engineering and Architecture
[2] University of Luxembourg,undefined
来源
关键词
RFID; Security; EPC global; Chaotic map;
D O I
暂无
中图分类号
学科分类号
摘要
Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis of these protocols and uncover their weaknesses. We prove that these protocols are vulnerable to tag tracing, tag impersonation and de-synchronization attacks. The attack complexity of an adversary is polynomial and the success probability of these attacks are substantial. Moreover, we also propose an improved RFID authentication protocol that employs Chebyshev chaotic maps and complies with the EPC global Class 1 Generation 2 standard. Finally, we show that our protocol is resistant against those security issues.
引用
收藏
页码:1135 / 1154
页数:19
相关论文
共 50 条
  • [21] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [22] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [23] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37
  • [24] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks
    Xie, Qi
    Yao, Ye
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [25] Desynchronization attacks on RFID security protocols
    Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
  • [26] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Lee, Tian-Fu
    Lin, Ching-Ying
    Lin, Chun-Li
    Hwang, Tzonelih
    NONLINEAR DYNAMICS, 2015, 82 (1-2) : 29 - 38
  • [27] DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols
    Chien, Hung-Yu
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 615 - 622
  • [28] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
    Tian-Fu Lee
    Ching-Ying Lin
    Chun-Li Lin
    Tzonelih Hwang
    Nonlinear Dynamics, 2015, 82 : 29 - 38
  • [29] Enhancing the security of FinTech applications with map-based graphical password authentication
    Meng, Weizhi
    Zhu, Liqiu
    Li, Wenjuan
    Han, Jinguang
    Li, Yan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 1018 - 1027
  • [30] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814