Vulnerability Analysis of Two Ultra-Lightweight RFID Authentication Protocols: RAPP and Gossamer

被引:0
|
作者
Taqieddin, Eyad [1 ]
Sarangapani, Jagannathan [2 ]
机构
[1] Jordan Univ Sci & Technol, Dept Network Engn & Secur, Irbid, Jordan
[2] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO USA
关键词
RFID; authentication; privacy; ultra-lightweight; permutation; substitution; GNY analysis; SASI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The available energy and computational resources needed for privacy and authentication in RFID systems are limited. In recent years, a new track of research investigated the feasibility of using ultra-lightweight protocols that are based on simple operations to provide the required privacy and mutual authentication functionality while meeting the stringent constraints. Several ideas were proposed and evaluated in an informal way by stating the message exchanges without considering the validity of the assumptions nor the correctness of the messages exchanged. Subsequent research efforts showed that most of these protocols were vulnerable to one attack or more. In this paper, we consider two ultra-lightweight mutual authentication protocols that were shown to be vulnerable to the full disclosure and de-synchronization attacks; respectively. The protocols are formally analyzed using GNY logic to explain the incorrect assumptions of the protocols, how these assumption were exploited, and how they could have been avoided.
引用
收藏
页码:80 / 86
页数:7
相关论文
共 50 条
  • [31] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Vali Gholami
    Mahdi R. Alagheband
    Wireless Networks, 2020, 26 : 2153 - 2169
  • [32] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Gholami, Vali
    Alagheband, Mandi R.
    WIRELESS NETWORKS, 2020, 26 (03) : 2153 - 2169
  • [33] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920
  • [34] Untraceability Analysis of Two RFID Authentication Protocols
    CHEN Xiuqing
    CAO Tianjie
    ZHAI Jingxuan
    Chinese Journal of Electronics, 2016, 25 (05) : 912 - 920
  • [35] A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol
    Barrero, David F.
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Camacho, David
    R-Moreno, Maria D.
    EXPERT SYSTEMS, 2014, 31 (01) : 9 - 19
  • [36] Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
    Tewari, Aakanksha
    Gupta, B. B.
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (03): : 1085 - 1102
  • [37] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
    Shariq, Mohd
    Singh, Karan
    Lal, Chhagan
    Conti, Mauro
    Khan, Tayyab
    COMPUTER NETWORKS, 2022, 217
  • [39] Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
    Aakanksha Tewari
    B. B. Gupta
    The Journal of Supercomputing, 2017, 73 : 1085 - 1102
  • [40] Lightweight Anonymous Authentication Protocols for RFID Systems
    Chen, Min
    Chen, Shigang
    Fang, Yuguang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1475 - 1488