Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol

被引:0
|
作者
Li, Jing [1 ]
Zhou, Zhiping [1 ]
Wang, Ping [1 ]
机构
[1] Jiangnan Univ, Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
RFID; forward privacy; backward privacy; Ouafi-Phan privacy model; GNY logic; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through analyzing the security of LMAP protocol, we point out that this protocol is vulnerable to several attacks including the data integrity, reader impersonation and traceability, forward traceability. Based on the above security drawbacks, an improved LAMP protocol is proposed. Aiming at the problem of data integrity, the backend server uses message authentication code to encrypt data information of tag; the reader mixes message generated by tag side to ensure resist impersonation reader attack; the tag side introduces blind factor against traceability attack; in addition, the keys of tags and backend server side can be updated dynamically according to the random number generated by tag side in different authentication cycles, to ensure the forward/backward privacy. The formal proof of correctness of the improved protocol is given based on GNY logic, and shows that the improved protocol resists various attack.
引用
收藏
页码:7292 / 7297
页数:6
相关论文
共 50 条
  • [21] Low-cost authentication protocol of the RFID system using partial ID
    Li, Yong-Zhen
    Jeong, Yoon-Su
    Sun, Ning
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 598 - +
  • [22] A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Lin, Feng
    Zhang, Lei
    Wei, Yuhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (03) : 1941 - 1958
  • [23] Low-cost authentication protocol for passive, computation capable RFID tags
    Gul N. Khan
    Markus Moessner
    Wireless Networks, 2015, 21 : 565 - 580
  • [24] Low-cost authentication protocol for passive, computation capable RFID tags
    Khan, Gul N.
    Moessner, Markus
    WIRELESS NETWORKS, 2015, 21 (02) : 565 - 580
  • [25] Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    Tso, Raylin
    Huang, Szu-Wei
    Wu, Mu-En
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 634 - 637
  • [26] Low-cost authentication protocol of the RFID system using partial ID
    Li, Yong-Zhen
    Jeong, Yoon-Su
    Sun, Ning
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1221 - 1224
  • [27] A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
    Poulopoulos, George
    Markantonakis, Konstantinos
    Mayes, Keith
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 706 - 711
  • [28] SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    Huang, Zhong
    WIRELESS NETWORKS, 2018, 24 (01) : 69 - 78
  • [29] Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Mellouki, Salah Addine
    Siraj, Zeba
    Zhan, Cheng
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2021, 13 (02) : 1 - 11
  • [30] SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
    Hanguang Luo
    Guangjun Wen
    Jian Su
    Zhong Huang
    Wireless Networks, 2018, 24 : 69 - 78