hmac-based authentication protocol: attacks and improvements

نویسندگان

mohammad javad emadi

amirkabir university of technology behzad abdolmaleki

information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery

information systems and security laboratory (issl), sharif university of technology, tehran, iran

چکیده

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privacy of the recent well-known hmac-based rfid mutual authentication protocol, is analyzed. we prove that this protocol is not secure against various attacks and also does not provide untraceability. also, in order to improve the performance of the mentioned protocol and enhance the security of rfid users, a more effective and secure authentication hmac-based protocol is presented. furthermore, security of our protocol is explored against different attacks such as; the replay attack, the tag’s id exposure, the spoofing attack, dos attack and traceability attack. it is shown that our proposed protocol is safe against the attacks. finally, the security of the presented protocol is compared with some well-known related protocols.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

HMAC Based Secure Authentication of VANET's

The Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services, such as detecting oncoming collisions and providing warning signals to alert the driver. The services provided by VANET are often based on collaboration among vehicles that are equipped with relatively simple motion sensors and GPS units. Awareness of its precise locat...

متن کامل

Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks

Until now, although many researchers proposed a variety of authentication protocol to verify the identity of the clients, most of these protocols are inefficient and ineffective. Gouda et al. proposed an anti-phishing single password protocol, but it is vulnerable to pharming attacks. In this paper, we show that the protocol is insecure, and propose a hash-based password authentication protocol...

متن کامل

SRMAP and ISLAP Authentication Protocols: Attacks and Improvements

RFID technology is a system which uses radio frequency to transmit data. Data transmission between Tags and Readers is wireless which can be easily eavesdropped by adversary. Due to security and privacy reasons, various authentication protocols proposed. In this paper, we cryptanalyze two different RFID authentication protocols and it is shown that either of them have some weaknesses. In 2014, ...

متن کامل

Improvements to Mitchell's Remote User Authentication Protocol

A provably secure protocol for remote authentication is presented. Only public information is stored at the verifying host that makes our scheme resistant to server compromise. We use one time signatures coupled with offline transcripts for synchronization. Due to sole usage of fast cryptographic hash functions, our method is appropriate for low cost user authentication. Our construction improv...

متن کامل

Improvements over Extended LMAP+: RFID Authentication Protocol

Radio Frequency Identification (RFID) systems are increasingly being deployed in a variety of applications. In this paper, we propose a light weight mutual authentication protocol which is an improvement over extended LMAP+ protocol. In mutual authentication, the tag and the reader of the RFID systems will authenticate each other before transmitting unique ID of tag. The proposed protocol provi...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
international journal of electrical and electronics engineering

جلد ۴۸، شماره ۲، صفحات ۷۱-۸۰

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023