A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems

被引:12
|
作者
Gao, Lijun [1 ,2 ,3 ]
Ma, Maode [2 ,4 ]
Shu, Yantai [2 ]
Wei, Yuhua [1 ]
机构
[1] Shenyang Aerosp Univ, Dept Comp Sci & Technol, Shenyang, Peoples R China
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
[3] Tianjin Univ, Dept Comp Engn, Tianjin 300072, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
RFID; Security; Intermittence position trace attacks; Desynchronization attacks; AUTHENTICATION PROTOCOL;
D O I
10.1007/s11277-012-0770-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Radio frequency identification (RFID) technology will become more popular in various applications in the near future. But the security issues in RFID systems have hindered this technical promotion seriously. The extant RFID security protocols have serious insufficiency and flaws to resistance trace attacks and desynchronization attacks. In this paper, we propose a security protocol that can against the intermittent position trace attacks and desynchronization attacks. We prove the security of the proposed protocol by data reduction method with the learning parity with noise and formally verify the functionality of the proposed scheme by using Colored Petri Nets.
引用
收藏
页码:1943 / 1959
页数:17
相关论文
共 50 条
  • [1] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Lijun Gao
    Maode Ma
    Yantai Shu
    Yuhua Wei
    [J]. Wireless Personal Communications, 2013, 68 : 1943 - 1959
  • [2] Data desynchronization attacks on RFID security protocols
    Cao, Zheng
    Ma, Jianfeng
    Yang, Lin
    Deng, Miaolei
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
  • [3] An efficient authentication protocol for RFID systems resistant to active attacks
    Peris-Lopez, Pedro
    Cesar Hernandez-Castro, Julio
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 781 - 794
  • [4] Data Desynchronization Attacks on two Lightweight Security Protocols for the RFID System
    Deng, Miaolei
    Zhang, Haojun
    Zhu, Weijun
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2331 - +
  • [5] Classification of major security attacks against RFID systems
    El Beqqal, Mohamed
    Azizi, Mostafa
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [6] Security Analysis of RFID Relay Attacks
    Guizani, Sghaier
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 191 - 196
  • [7] Investigating attacks to improve security and privacy in RFID systems using the security bit method
    Damghani, Hamidreza
    Hosseinian, Heliasadat
    Damghani, Leila
    [J]. 2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
  • [8] DNN-based speech watermarking resistant to desynchronization attacks
    Pavlovic, Kosta
    Kovacevic, Slavko
    Djurovic, Igor
    Wojciechowski, Adam
    [J]. INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2023, 21 (05)
  • [9] Attacks and Improvements to a New RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Gardeshi, Mahmud
    Alagheband, Mahdi R.
    [J]. RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 66 - 80
  • [10] Two Attacks against the Ff RFID Protocol
    Billet, Olivier
    Elkhiyaoui, Kaoutar
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 308 - +