On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Publish Year: 1395
نوع سند: مقاله ژورنالی
زبان: English
View: 186

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSE-3-4_001

تاریخ نمایه سازی: 12 دی 1400

Abstract:

The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the IoT systems. The using of bit-wise functions such as XOR, Shift and Rotation could decrease the cost of authentication protocols. On the other hand, the simple operations usually could not provide an acceptable security level. Therefore, the researchers try to improve the security level by creating new permutation functions. In this paper, we evaluate some permutation functions and analyze a protocol which recently has been proposed by Huang et al. We prove that their protocol is vulnerable to the disclosure and the impersonation attacks and an adversary can clone a valid tag easily. The complexity of the proposed attack is low and attack method works efficiently for the secret keys and ID numbers with variable length.

Authors

Samad Rostampour

Department of Computer Engineering, Science and Research branch, Islamic Azad University, Tehran, Iran

Nasour Bagheri

Department of Electrical Engineering, Shahid Rajaee Teachers Training University, Tehran, Iran

Mehdi Hosseinzadeh

Department of Electrical Engineering, Shahid Rajaee Teachers Training University, Tehran, Iran

Ahmad Khademzadeh

Iran Telecommunication Research Center, Tehran, Iran