Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
نویسندگان
چکیده
Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study vulnerabilities associated with operations by doing cryptanalysis a protocol tags. The like rotation and XOR show that is vulnerable tag, reader, node impersonation attacks. We find major cause vulnerability suggest physically unclonable functions rather than such protocols. provide formal analysis AVISPA tool various
منابع مشابه
Authentication Test - Based the RFID Authentication Protocol with Security Analysis
To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authenticat...
متن کاملSecurity Analysis of a PUF based RFID Authentication Protocol
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...
متن کاملSecurity analysis of LMAP++, an RFID authentication protocol
Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in various practical applications these days. Security analysis of the way these tags are used in an application is a must for successful adoption of the RFID technology. Depending on the requirements of the particular application, security demands on these tags cover some or all of the aspects such as privacy, ...
متن کاملSecurity Analysis on RFID Mutual Authentication Protocol
Radio frequency identification (RFID) has received much attention both in industry and academia in recent years. To this extent, the international standards group, ISO/IEC JTC 1/SC 31, is in the midst of standardization activity to define the security extension to the EPCglobal Generation 2 (Gen2) ultra high frequency (UHF) air interface protocols for secure RFID communications. In this paper, ...
متن کاملThe Increase of RFID Privacy and Security with Mutual Authentication Mechanism in Supply Chain Management
In recent years, the privacy is very important for the supply chain management, since the privacy of a people can not be followed when their embedded information are kept secretly. This is the reason why the RFID system has became increasingly sophisticated and has resulted to many more applications. However, the existence of some RFID privacy and security issues still need to be resolved. In t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Personal Communications
سال: 2022
ISSN: ['1572-834X', '0929-6212']
DOI: https://doi.org/10.1007/s11277-022-09826-4