期刊文献+

ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3

ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX
下载PDF
导出
摘要 Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
出处 《Journal of Electronics(China)》 2013年第1期33-39,共7页 电子科学学刊(英文版)
基金 Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) the National Natural Science Foundation of China (No.60903181) Nanjing University of Posts and Telecommunications Funds (No.NY208072)
关键词 认证协议 主动攻击 RFID 矩阵和 身份验证协议 无线射频识别 可扩展性 安全性 Radio Frequency IDentification (RFID) Mutual authentication Matrix-based Imper-sonation attack Privacy Scalability
  • 相关文献

同被引文献22

  • 1Want R. Santa Clara. An Introduction to RFID Technology[J]. IEEE Pervasive Computing, 2006, 5(1): 25-33.
  • 2Landt J. The History ofRFID[J]. IEEE Potential, 2005, 24(4): 8-11.
  • 3Weinstein R. RFID: A Ttechnical Overview and Its Application to the Enterprise[J]. IT Professional, 2005, 7(3): 27-33.
  • 4Rebecca Angeles. RFID Technology: Supply-chain Application and Implementation lssues[J]. Information Systems Management, 2005, 22(1):51-65.
  • 5Juels A. RFID Security and Privacy: A Research Survey[J]. 1EEE Selected Areas in Communications, 2006, 24(2): 381-394.
  • 6Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels. RFID Systems and Security and Privacy Implications[C]// Cryptographic Hardware and embedded Systems(CHES-2002). Redwood city, USA: Springer, 2002: 454-469.
  • 7Hung-Yu Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 8MC De Vivo, A Polzonetti, P Tapanelli. RFID Privacy and Security Risks: Italian case study[C]// The 6th International Conference on Advances in Information Technology. Bangkok, Thailand: Springer, 2013: 173-183.
  • 9Singh, Ajay Kant, Dhal, Subhaish, Sengupta, Indranil. An Approach to Solve Tracking and Message Blocking Problems in lI.FID[C]//2014 Fourth International Conference on Communication Systems and Network Technologies. Bhophal, India: IEEE, 2014:1187-1191.
  • 10Jung Tae K(m. Analyses of attacks on Embedded ILFID application under U-Healthcare system[C]// Future Information Communication Technology and Applications. Shenyang, China : Springer, 2013: 1039- 1044.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部