Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.08.2015

Traceability Analysis of Recent RFID Authentication Protocols

verfasst von: Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki, Mohammad Reza Aref

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Radio frequency identification (RFID) technology is a prominent technology which has been used in most authentication and identification applications. Above all, recently RFID systems have got more attention as an interesting candidate to implement in the internet of things systems. Although RFID systems provide useful and interest services to users, they can also threat the security and the privacy of the end-users. In order to provide the security and the privacy of RFID users, different authentication protocols have been proposed. In this study, we analyze the privacy of three RFID authentication protocols that proposed recently. For our privacy analysis, we use a formal RFID privacy model which proposed by Ouafi and Phan. It is shown that the privacy of all the analyzed protocols have some problems and cannot provide user privacy. Then, in order to keep and protect the privacy of RFID users, two improved versions of analyzed protocols are proposed which overcome all the existing weaknesses. Our privacy analysis show that privacy of improved protocols are complete and they are resistance against different traceability attacks such as traceability, backward traceability and forward traceability attacks. In addition, the privacy of the proposed protocols, analyzed protocols and some similar protocols is compared.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Maharjan, S. (2010). RFID and IOT: An overview. Simula Research Laboratory, University of Oslo. Maharjan, S. (2010). RFID and IOT: An overview. Simula Research Laboratory, University of Oslo.
4.
Zurück zum Zitat Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B., & Xinling, Y. (2013). Hash-based RFID mutual authentication protocol. International Journal of Security & Its Applications, 7(3), 183–194. Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B., & Xinling, Y. (2013). Hash-based RFID mutual authentication protocol. International Journal of Security & Its Applications, 7(3), 183–194.
5.
Zurück zum Zitat Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Journal of Computer Communication, 34, 556–566.CrossRef Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Journal of Computer Communication, 34, 556–566.CrossRef
6.
Zurück zum Zitat Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C., Bagheri, N., & Naderi, M. (2011). Cryptanalysis of Cho et al.’s protocol, a hash-based mutual authentication protocol for RFID systems. Cryptology ePrint Archive, Report 2011/311. http://eprint.iacr.org/2011/331.pdf Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C., Bagheri, N., & Naderi, M. (2011). Cryptanalysis of Cho et al.’s protocol, a hash-based mutual authentication protocol for RFID systems. Cryptology ePrint Archive, Report 2011/311. http://​eprint.​iacr.​org/​2011/​331.​pdf
7.
Zurück zum Zitat Yoon, E. J. (2012). Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Journal of Expert Systems Application, 39(11), 1589–1594.CrossRef Yoon, E. J. (2012). Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Journal of Expert Systems Application, 39(11), 1589–1594.CrossRef
8.
Zurück zum Zitat Asadpour, M., & Dashti, M. T. (2013). Scalable, privacy preserving radio-frequency identification protocol for the internet of things. Journal of Concurrency and Computation: Practice and Experience,. doi:10.1002/cpe.3165 Asadpour, M., & Dashti, M. T. (2013). Scalable, privacy preserving radio-frequency identification protocol for the internet of things. Journal of Concurrency and Computation: Practice and Experience,. doi:10.​1002/​cpe.​3165
9.
Zurück zum Zitat Alagheband, M. R., & Aref, M. R. (2013). Unified privacy analysis of new found RFID authentication protocols. Security and Communication Networks, 6(8), 999–1009.CrossRef Alagheband, M. R., & Aref, M. R. (2013). Unified privacy analysis of new found RFID authentication protocols. Security and Communication Networks, 6(8), 999–1009.CrossRef
10.
Zurück zum Zitat Avoine, G., Bingol, M. A., Carpent, X., & Yalcin, S. B. O. (2013). Privacy-friendly authentication in RFID systems: On sublinear protocols based on symmetric-key cryptography. Journal of IEEE Transactions on Mobile Computing, 12(10), 2037–2049.CrossRef Avoine, G., Bingol, M. A., Carpent, X., & Yalcin, S. B. O. (2013). Privacy-friendly authentication in RFID systems: On sublinear protocols based on symmetric-key cryptography. Journal of IEEE Transactions on Mobile Computing, 12(10), 2037–2049.CrossRef
11.
Zurück zum Zitat Sohrabi-Bonab, Z., Alagheband, M., & Aref, M. R. (2013). Traceability analysis of quadratic residue-based RFID authentication protocols. In 11th Annual international conference on privacy, security and trust, pp. 61–68, Tarragona. Sohrabi-Bonab, Z., Alagheband, M., & Aref, M. R. (2013). Traceability analysis of quadratic residue-based RFID authentication protocols. In 11th Annual international conference on privacy, security and trust, pp. 61–68, Tarragona.
12.
Zurück zum Zitat Dehkordi, M. H., & Farzaneh, Y. (2014). Improvement of the hash-based RFID mutual authentication protocol. Wireless Personal Communications, 75(1), 219–232.CrossRef Dehkordi, M. H., & Farzaneh, Y. (2014). Improvement of the hash-based RFID mutual authentication protocol. Wireless Personal Communications, 75(1), 219–232.CrossRef
13.
Zurück zum Zitat Habibi, M. H., & Gardeshi, M. (2011). Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard. In 8th International ISC conference on information security and cryptology (ISCISC), pp. 49–54. Habibi, M. H., & Gardeshi, M. (2011). Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard. In 8th International ISC conference on information security and cryptology (ISCISC), pp. 49–54.
15.
Zurück zum Zitat Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.MathSciNetCrossRef Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.MathSciNetCrossRef
16.
Zurück zum Zitat Avoine, G. (2012). Privacy-friendly synchronized ultralightweight authentication protocols in the storm. Journal of Network and Computer Applications, 35(2), 826–843.CrossRef Avoine, G. (2012). Privacy-friendly synchronized ultralightweight authentication protocols in the storm. Journal of Network and Computer Applications, 35(2), 826–843.CrossRef
17.
Zurück zum Zitat Phan, R. C. W. (2008). Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI. IEEE Transaction Dependable and Secure Computing, 6(4), 316–320.CrossRef Phan, R. C. W. (2008). Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI. IEEE Transaction Dependable and Secure Computing, 6(4), 316–320.CrossRef
18.
Zurück zum Zitat Juels, A., & Weis, S. (2007). Defining strong privacy for RFID. In 5th Annual IEEE international conference on pervasive computing and communications, pp. 342–347. Juels, A., & Weis, S. (2007). Defining strong privacy for RFID. In 5th Annual IEEE international conference on pervasive computing and communications, pp. 342–347.
19.
Zurück zum Zitat Vaudenay, S. (2007). On privacy models for RFID. In ASIACRYPT 2007, advances in cryptology, pp. 68–87. Vaudenay, S. (2007). On privacy models for RFID. In ASIACRYPT 2007, advances in cryptology, pp. 68–87.
20.
Zurück zum Zitat Ouafi, K., & Phan, R. C. W. (2008). Privacy of recent RFID authentication protocols. In 4th International conference on information security practice and experience. Ouafi, K., & Phan, R. C. W. (2008). Privacy of recent RFID authentication protocols. In 4th International conference on information security practice and experience.
21.
Zurück zum Zitat Deng, R. H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework work for RFID privacy. In 15th European symposium on research in computer security, Athens. Deng, R. H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework work for RFID privacy. In 15th European symposium on research in computer security, Athens.
22.
Zurück zum Zitat Cho, J.-S., Jeong, Y.-S., & Park, S. O. (2012). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Journal of Computers and Mathematics with Applications,. doi:10.1016/j.camwa.2012.02.025 Cho, J.-S., Jeong, Y.-S., & Park, S. O. (2012). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Journal of Computers and Mathematics with Applications,. doi:10.​1016/​j.​camwa.​2012.​02.​025
23.
Zurück zum Zitat Khedr, W. I. (2013). SRFID: A hash-based security scheme for low cost RFID systems. Egyptian Informatics Journal, 14(1), 89–98.MathSciNetCrossRef Khedr, W. I. (2013). SRFID: A hash-based security scheme for low cost RFID systems. Egyptian Informatics Journal, 14(1), 89–98.MathSciNetCrossRef
24.
Zurück zum Zitat Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID confirming to EPC class 1 generation 2 standards. Journal of Computer Standards & Interfaces, 29(2), 254–259.MathSciNetCrossRef Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID confirming to EPC class 1 generation 2 standards. Journal of Computer Standards & Interfaces, 29(2), 254–259.MathSciNetCrossRef
25.
Zurück zum Zitat Yeh, T. C., Wanga, Y. J., Kuo, T. Ch., & Wanga, S. S. (2010). Securing RFID systems conforming to EPC class 1 generation 2 standard. Journal of Expert Systems with Applications, 37, 7678–7683.CrossRef Yeh, T. C., Wanga, Y. J., Kuo, T. Ch., & Wanga, S. S. (2010). Securing RFID systems conforming to EPC class 1 generation 2 standard. Journal of Expert Systems with Applications, 37, 7678–7683.CrossRef
26.
Zurück zum Zitat Alavi, S. M., Baghery, K., & Abdolmaleki, B. (2014). Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags. Advances in Computer Science: An International Journal, 3(5), 44–52. Alavi, S. M., Baghery, K., & Abdolmaleki, B. (2014). Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags. Advances in Computer Science: An International Journal, 3(5), 44–52.
27.
28.
Zurück zum Zitat Zhou, S., Zhang, Z., Luo, Z., & Wong, E. (2010). A lightweigth anti-desynchronization RFID authentication protocol. Information Systems Frontiers, 12, 521–528.CrossRef Zhou, S., Zhang, Z., Luo, Z., & Wong, E. (2010). A lightweigth anti-desynchronization RFID authentication protocol. Information Systems Frontiers, 12, 521–528.CrossRef
29.
Zurück zum Zitat Cho, J. S., Yeo, S. S., & Kim, S. K. (2011). Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34, 391–397.CrossRef Cho, J. S., Yeo, S. S., & Kim, S. K. (2011). Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34, 391–397.CrossRef
Metadaten
Titel
Traceability Analysis of Recent RFID Authentication Protocols
verfasst von
Seyed Mohammad Alavi
Karim Baghery
Behzad Abdolmaleki
Mohammad Reza Aref
Publikationsdatum
01.08.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2469-0

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt