Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain

نویسندگان

چکیده

Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study vulnerabilities associated with operations by doing cryptanalysis a protocol tags. The like rotation and XOR show that is vulnerable tag, reader, node impersonation attacks. We find major cause vulnerability suggest physically unclonable functions rather than such protocols. provide formal analysis AVISPA tool various

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Test - Based the RFID Authentication Protocol with Security Analysis

To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authenticat...

متن کامل

Security Analysis of a PUF based RFID Authentication Protocol

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...

متن کامل

Security analysis of LMAP++, an RFID authentication protocol

Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in various practical applications these days. Security analysis of the way these tags are used in an application is a must for successful adoption of the RFID technology. Depending on the requirements of the particular application, security demands on these tags cover some or all of the aspects such as privacy, ...

متن کامل

Security Analysis on RFID Mutual Authentication Protocol

Radio frequency identification (RFID) has received much attention both in industry and academia in recent years. To this extent, the international standards group, ISO/IEC JTC 1/SC 31, is in the midst of standardization activity to define the security extension to the EPCglobal Generation 2 (Gen2) ultra high frequency (UHF) air interface protocols for secure RFID communications. In this paper, ...

متن کامل

The Increase of RFID Privacy and Security with Mutual Authentication Mechanism in Supply Chain Management

In recent years, the privacy is very important for the supply chain management, since the privacy of a people can not be followed when their embedded information are kept secretly. This is the reason why the RFID system has became increasingly sophisticated and has resulted to many more applications. However, the existence of some RFID privacy and security issues still need to be resolved. In t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2022

ISSN: ['1572-834X', '0929-6212']

DOI: https://doi.org/10.1007/s11277-022-09826-4