Formal security and privacy analysis and improvements of RFID hash-based authentication protocol
Publish place: Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Publish Year: 1396
نوع سند: مقاله کنفرانسی
زبان: English
View: 568
This Paper With 11 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
COMCONF05_533
تاریخ نمایه سازی: 21 اردیبهشت 1397
Abstract:
Radio Frequency IDentification (RFID) technology has been used in most applications for authentication and authorization.However, RFID systems can be traced by an adversary. Many protocols have been proposed to improve the efficiency, security and privacy requirements of RFID. Most of protocols are vulnerable to desynchronization, impersonation, replay, and traceability attacks. In this paper, we prove that the new hash function-based protocol proposed by Zhang Xiaohong is insecure against the impersonation, replay, data desynchronization, traceability, and forward/backward traceability attacks. Also, we apply simulation based privacy model proposed by Vaudenay to analyze privacy aspects. The protocol cannot support any level of privacy as well.Then we propose an improved protocol to prevent the mentioned attacks and guarantee both security and privacy.
Authors
Arezoo Rezaei
Department of Electrical Engineering, Yadegar - e- Imam Khomeini (rah), shahr-e-rey Branch, Islamic Azad University, Tehran, Iran.
Mahdi R. Alagheband
Assistant Professor, Electrical Engineering Faculty, Science and Research Branch, Islamic Azad University, Tehran,Iran.