Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement

نویسندگان

  • Xu Zhuang
  • Zhi-Hui Wang
  • Chin-Chen Chang
  • Yan Zhu
چکیده

Retrieval of texture images, especially those with different orientation and scale changes, is a challenging and important problem in image analysis. This paper adopts spiking cortical model (SCM) to explore geometrical invariant texture retrieval schemes based on Discrete Cosine Transform (DCT) coefficients of pulse images. The series of pulse images, outputs of SCM, have a robust talent for extracting edge, segment and texture which are inherent in the original images, but they are large 2-dimensional image data so that it is difficult tSome ultra-lightweight RFID protocols have recently been developed. Unlike other RFID protocols, ultra-lightweight protocols generally only need the simplest bitwise operations in the tag side, such as XOR, AND, and OR. In 2012, Tian etal. proposed a new ultra-lightweight RFID protocol named RAPP (RFID authentication protocol with permutation) using a new bitwise operation Permutation in the protocol, which can achieve high security and privacy as claimed. Unfortunately, because of the incomplete session that might occur in RAPP, we present a replay attack which can lead to de-synchronization between a tag and the database, which means the tag can no longer be authenticated by any reader. In addition, we also present a simple de-synchronization attack that can break the synchronization state between a tag and the database, like the replay attack. Some potential threats resulting in more security concerns from RAPP are illustrated by using two properties of Permutation revealed in this paper. We also provide some countermeasures for RAPP to withstand attacks mentioned in the paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce

Over the last few years, more people perform their social activities on mobile devices, such as mobile payment or mobile wallet. Mobile commerce (m-commerce) refers to manipulating electronic commerce (e-commerce) by using mobile devices and wireless networks. Radio frequency identification (RFID) is a technology which can be employed to complete payment functions on m-commerce. As an RFID subs...

متن کامل

Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication Protocol with Permutation

The security of RFID systems is a very important issue in the applications of RFID systems. Developing of authentication protocols is a general solution to * Corresponding author: e-mail: [email protected] (Eun-Jun Yoon) 3434 Il-Soo Jeon and Eun-Jun Yoon resist security attacks. However, since low-cost RFID tags have very limited hardware resources, it is not easy to develop an authentication pr...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol

Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013