Další formáty:
BibTeX
LaTeX
RIS
@article{8463, author = {Hosseinzadeh, Mehdi and Ahmed, Omed Hassan and Ahmed, Sarkar Hasan and Trinh, Cuong and Bagheri, Nasour and Kumari, Saru and Lánský, Jan and Huynh, Bao}, article_location = {USA}, article_number = {1}, doi = {http://dx.doi.org/10.1109/ACCESS.2020.3008230}, keywords = {IoT; RFID; mutual authentication; security analysis; desynchronization; traceability; impersonation; real-or-random model}, language = {eng}, issn = {2169-3536}, journal = {IEEE Access}, title = {An Enhanced Authentication Protocol for RFID Systems}, url = {https://ieeexplore.ieee.org/document/9137126}, volume = {8}, year = {2020} }
TY - JOUR ID - 8463 AU - Hosseinzadeh, Mehdi - Ahmed, Omed Hassan - Ahmed, Sarkar Hasan - Trinh, Cuong - Bagheri, Nasour - Kumari, Saru - Lánský, Jan - Huynh, Bao PY - 2020 TI - An Enhanced Authentication Protocol for RFID Systems JF - IEEE Access VL - 8 IS - 1 SP - 126977-126987 EP - 126977-126987 PB - IEEE SN - 21693536 KW - IoT KW - RFID KW - mutual authentication KW - security analysis KW - desynchronization KW - traceability KW - impersonation KW - real-or-random model UR - https://ieeexplore.ieee.org/document/9137126 L2 - https://ieeexplore.ieee.org/document/9137126 N2 - In this paper, we analyse the security of two mutual authentication protocols that have been recently proposed by Gao et al. (IEEE Access, 7:8376–8384, 2019), a hash-based protocol and a Rabin public key based protocol. Our security analysis clearly shows important security pitfalls in these schemes. More precisely, in each protocol, we introduce efficient approaches to desynchronize the tag and the reader/server. The proposed attacks are almost deterministic and the complexity of each attack is a session for the hash-based and three sessions for Rabin public key based protocol. In addition, in the case of the hash-based protocol, we extend the proposed desynchronization attack to a traceability attack in which the adversary can trace any given tag based on the proposed attack with probability of almost one. In the case of Rabin public key based protocol, we extend the proposed desynchronization attack to a tag impersonation attack with the success probability of one. Besides, we propose an enhanced version of the Rabin public key based protocol to provide a secure authentication between the tag and the reader. We evaluate the security of the proposed protocol formally using the Scyther tool and also in Real-or-Random model. ER -
HOSSEINZADEH, Mehdi, Omed Hassan AHMED, Sarkar Hasan AHMED, Cuong TRINH, Nasour BAGHERI, Saru KUMARI, Jan LÁNSKÝ a Bao HUYNH. An Enhanced Authentication Protocol for RFID Systems. \textit{IEEE Access}. USA: IEEE, roč.~8, č.~1, s.~126977-126987. ISSN~2169-3536. doi:10.1109/ACCESS.2020.3008230. 2020.
|