Attacks and improvements to chaotic map-based RFID authentication protocol
Autor: | Mehmet Ufuk Çağlayan, Mete Akgün, Ali Osman Bayrak |
---|---|
Rok vydání: | 2015 |
Předmět: |
Authentication
Otway–Rees protocol Computer Networks and Communications business.industry Computer science Cryptographic protocol Computer security computer.software_genre Identification (information) Authentication protocol Radio-frequency identification Wide Mouth Frog protocol business Protocol (object-oriented programming) computer Information Systems |
Zdroj: | Security and Communication Networks. 8:4028-4040 |
ISSN: | 1939-0114 |
DOI: | 10.1002/sec.1319 |
Popis: | Because of its low cost and ease of deployment, radio frequency identification RFID technology offers great potential for all applications that require identification. Main obstacle for wide adoption of this technology is the concerns about its security and privacy issues. Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Recently, Benssalah et al. have proposed a chaotic map-based RFID security protocol. In this paper, we analyze the security of this protocol and discover its vulnerabilities. We show that message generation arises some weaknesses, and this protocol is vulnerable to tracking, tag impersonation, and de-synchronization attacks. The success probabilities of the proposed attacks are significant, and their complexities are polynomial. Furthermore, we propose an RFID authentication protocol. Our protocol utilizes the Chebyshev chaotic map hard problem and conforms to the EPCglobal Class 1 Generation 2 EPC C1-G2 standard. Our protocol eliminates the weaknesses of the protocol of Benssalah et al. Copyright © 2015 John Wiley & Sons, Ltd. |
Databáze: | OpenAIRE |
Externí odkaz: |