Cryptanalysis and Improvement of RFID Ownership Transfer Protocol

نویسندگان

  • Xiuqing Chen
  • Qiang Zhao
  • Tianjie Cao
  • Jingxuan Zhai
چکیده

The widespread use of Radio Frequency Identification (RFID) technologies help to trace a large number of commodity and share the tag information in the supply chain system. However, many ownership transfer protocols are subject to various attacks. We analyze the security of two protocols. Even if the designers claim that their protocols are security, we find that their schemes suffer from forward traceability attacks and tracing attacks. In addition, we show that a weak attacker can retrieve the secrets of the tag with a probability 1 in Kardaş et al.’s protocol. To resist against these attacks, we present an improved scheme based on Kardaş et al.’s protocol by adopting the new key-update mechanism. In the end, we show the enhanced versions provides the forward and backward untraceable security properties.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags

Ownership transfer and grouping proof protocols are the two most important requirements for RFID tag in various applications such as pharmaceutical distribution and manufacturing. In 2010, Zuo integrated these two requirements and introduced a protocol for RFID tag group ownership transfer (GOT), i.e., transferring the ownership of a group of tags in one session. However, this paper shows that ...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Cryptanalysis of Some Protocols for RFID Systems

In this paper we analyze the security of the mutual authentication and ownership transfer protocols which have been recently proposed by Kulseng et al. Our analysis demonstrates a variety of attacks against these protocols. We present a secret parameters disclosure attack which discloses any secret parameter between the tag and the reader. Our disclosure attack can be easily used as an imperson...

متن کامل

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...

متن کامل

A Novel RFID Authentication Protocol with Ownership Transfer

During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016