Analysis of a Recent Hash Based RFID Authentication Protocol Intended for Telecare Medicine
نویسنده
چکیده
---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Radio Frequency Identification (RFID) is technologically one of the most popular batch identification methods of our modern age. The low cost RFID stickers (tags) are gradually replacing traditional paper barcodes. However, the use of tags comes at a an additional expense in terms of die area and clock cycle resources needed for secure operation, through open air. Contrarily, due to the cost competition with traditional barcodes, limited resources can be spared for security. Therefore, guaranteeing the integrity and confidentiality of the transmitted information is a hard challenge, in RFID technology. Since the cryptographic algorithms used in computers cannot fit in tags, other strong encryption functions are needed to protect the exchanged information. This is the main reason behind the RFID security community’s convergence on alternative function proposals for obscuring the exchanged information. Unfortunately, many of the proposed schemes have been demonstrated to show security weaknesses. One latest work relies on the strength of hash functions, to recommend an authentication protocol for the mission critical telecare medicine. Naturally, any breach in the security of the proposed protocol may mean a health or privacy risk for its users. The present work uses a two stage analysis to test the proposed protocol. An algebraic analysis is supported by the rainbow tables approach to expose the secrets of the protocol. The security evaluation demonstrates multiple security weaknesses in the protocol’s design. The weaknesses prove to be so grave that the proposed authentication protocol may be classified as insecure and unsafe for its telecare users.
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Privacy Preserving Improvement for SRTA in Telecare Systems
Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed S...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015