Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol

被引:0
|
作者
Li, Jing [1 ]
Zhou, Zhiping [1 ]
Wang, Ping [1 ]
机构
[1] Jiangnan Univ, Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
RFID; forward privacy; backward privacy; Ouafi-Phan privacy model; GNY logic; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through analyzing the security of LMAP protocol, we point out that this protocol is vulnerable to several attacks including the data integrity, reader impersonation and traceability, forward traceability. Based on the above security drawbacks, an improved LAMP protocol is proposed. Aiming at the problem of data integrity, the backend server uses message authentication code to encrypt data information of tag; the reader mixes message generated by tag side to ensure resist impersonation reader attack; the tag side introduces blind factor against traceability attack; in addition, the keys of tags and backend server side can be updated dynamically according to the random number generated by tag side in different authentication cycles, to ensure the forward/backward privacy. The formal proof of correctness of the improved protocol is given based on GNY logic, and shows that the improved protocol resists various attack.
引用
收藏
页码:7292 / 7297
页数:6
相关论文
共 50 条
  • [1] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [2] A Lightweight Authentication Protocol for Low-Cost RFID
    Chien, Hung-Yu
    Huang, Chen-Wei
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01): : 95 - 102
  • [3] A Lightweight Authentication Protocol for Low-Cost RFID
    Hung-Yu Chien
    Chen-Wei Huang
    Journal of Signal Processing Systems, 2010, 59 : 95 - 102
  • [4] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147
  • [5] An authentication protocol for low-cost RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 208 - 223
  • [6] Spacing based Authentication Protocol for Low-Cost RFID
    Jin, Zhen-Ai
    Cheng, Zi-Qiang
    Yoo, Kee-Young
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 158 - +
  • [7] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [8] An efficient authentication protocol for low-cost RFID systems
    Jin, Zhen-Ai
    Cho, Hyun-Ju
    Yoo, Kee-Young
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 999 - +
  • [9] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104
  • [10] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46