Skip to main content
Erschienen in: The Journal of Supercomputing 8/2017

17.01.2017

Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things

verfasst von: Masoumeh Safkhani, Nasour Bagheri

Erschienen in: The Journal of Supercomputing | Ausgabe 8/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is a technology in which for any object the ability to send data via communications networks is provided. Ensuring the security of Internet services and applications is an important factor in attracting users to use this platform. In the other words, if people are unable to trust that the equipment and information will be reasonably safe against damage, abuse and the other security threats, this lack of trust leads to a reduction in the use of IoT-based applications. Recently, Tewari and Gupta (J Supercomput 1–18, 2016) have proposed an ultralightweight RFID authentication protocol to provide desired security for objects in IoT. In this paper, we consider the security of the proposed protocol and present a passive secret disclosure attack against it. The success probability of the attack is ‘1’ while the complexity of the attack is only eavesdropping one session of the protocol. The presented attack has negligible complexity. We verify the correctness of the presented attack by simulation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inf Process Lett 113(7):205–209MathSciNetCrossRefMATH Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultralightweight authentication protocol. Inf Process Lett 113(7):205–209MathSciNetCrossRefMATH
2.
Zurück zum Zitat Ahmadian Z, Salmasizadeh M, Aref MR (2013) Recursive linear and differential cryptanalysis of ultralightweight authentication protocols. IEEE Trans Inf Forensics Secur 8(7):1140–1151CrossRef Ahmadian Z, Salmasizadeh M, Aref MR (2013) Recursive linear and differential cryptanalysis of ultralightweight authentication protocols. IEEE Trans Inf Forensics Secur 8(7):1140–1151CrossRef
3.
Zurück zum Zitat An R, Feng H, Liu Q, Li L (2017) Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things. Springer, Berlin, pp 857–878 An R, Feng H, Liu Q, Li L (2017) Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things. Springer, Berlin, pp 857–878
4.
Zurück zum Zitat Avoine G, Carpent X (2012) Yet another ultralightweight authentication protocol that is broken. In: Workshop on s Security—RFIDSec’12, Nijmegen Avoine G, Carpent X (2012) Yet another ultralightweight authentication protocol that is broken. In: Workshop on s Security—RFIDSec’12, Nijmegen
5.
Zurück zum Zitat Avoine G, Carpent X, Martin B (2012) Privacy-friendly synchronized ultralightweight authentication protocols in the storm. J Netw Comput Appl 35(2):826–843CrossRef Avoine G, Carpent X, Martin B (2012) Privacy-friendly synchronized ultralightweight authentication protocols in the storm. J Netw Comput Appl 35(2):826–843CrossRef
7.
Zurück zum Zitat Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949CrossRef Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949CrossRef
8.
Zurück zum Zitat Chien H-Y (2007) Sasi: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secur Comput 4(4):337–340CrossRef Chien H-Y (2007) Sasi: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secur Comput 4(4):337–340CrossRef
9.
Zurück zum Zitat Daemen J, Rijmen V (2002) The design of Rijndael: AES—the advanced encryption standard. Information Security and Cryptography. Springer, BerlinCrossRefMATH Daemen J, Rijmen V (2002) The design of Rijndael: AES—the advanced encryption standard. Information Security and Cryptography. Springer, BerlinCrossRefMATH
10.
Zurück zum Zitat D’Arco P, Santis AD (2008) Weaknesses in a recent ultra-lightweight RFID authentication protocol. In: Vaudenay S (ed) AFRICACRYPT Lecture Notes in Computer Science, vol 5023. Springer, Berlin, pp 27–39 D’Arco P, Santis AD (2008) Weaknesses in a recent ultra-lightweight RFID authentication protocol. In: Vaudenay S (ed) AFRICACRYPT Lecture Notes in Computer Science, vol 5023. Springer, Berlin, pp 27–39
11.
Zurück zum Zitat D’Arco P, Santis AD (2011) On ultralightweight RFID authentication protocols. IEEE Trans Dependable Secur Comput 8(4):548–563CrossRef D’Arco P, Santis AD (2011) On ultralightweight RFID authentication protocols. IEEE Trans Dependable Secur Comput 8(4):548–563CrossRef
12.
Zurück zum Zitat Guo P, Wang J, Geng XH, Kim CS, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935 Guo P, Wang J, Geng XH, Kim CS, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
13.
Zurück zum Zitat Gupta B, Agrawal DP, Yamaguchi S (eds) (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey Gupta B, Agrawal DP, Yamaguchi S (eds) (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey
14.
Zurück zum Zitat Peris-Lopez P, Castro JCH, Estévez-Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: WISA, pp 56–68 Peris-Lopez P, Castro JCH, Estévez-Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: WISA, pp 56–68
15.
Zurück zum Zitat Phan RC-W (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320CrossRef Phan RC-W (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320CrossRef
16.
Zurück zum Zitat Quan Q, Jia Y-L, Zhang R (2016) A lightweight RFID security protocol based on elliptic curve cryptography. Int J Netw Secur 18(2):354–361 Quan Q, Jia Y-L, Zhang R (2016) A lightweight RFID security protocol based on elliptic curve cryptography. Int J Netw Secur 18(2):354–361
17.
Zurück zum Zitat Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATH Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATH
18.
Zurück zum Zitat Ronen E, O’Flynn C, Shamir A, Weingarten A (2016) IoT goes nuclear: creating a zigbee chain reaction. IACR Cryptology ePrint Archive 2016:1047 Ronen E, O’Flynn C, Shamir A, Weingarten A (2016) IoT goes nuclear: creating a zigbee chain reaction. IACR Cryptology ePrint Archive 2016:1047
19.
Zurück zum Zitat Ronen E, Shamir A (2016) Extended functionality attacks on IoT devices: the case of smart lights. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, 21–24 March 2016, pp 3–12 Ronen E, Shamir A (2016) Extended functionality attacks on IoT devices: the case of smart lights. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, 21–24 March 2016, pp 3–12
20.
Zurück zum Zitat Tewari A, Gupta BB (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 1–18. doi:10.1007/s11227-016-1849-x Tewari A, Gupta BB (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 1–18. doi:10.​1007/​s11227-016-1849-x
21.
Zurück zum Zitat Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef
Metadaten
Titel
Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
verfasst von
Masoumeh Safkhani
Nasour Bagheri
Publikationsdatum
17.01.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 8/2017
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-1959-0

Weitere Artikel der Ausgabe 8/2017

The Journal of Supercomputing 8/2017 Zur Ausgabe

Premium Partner