Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol

被引:0
|
作者
Li, Jing [1 ]
Zhou, Zhiping [1 ]
Wang, Ping [1 ]
机构
[1] Jiangnan Univ, Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
RFID; forward privacy; backward privacy; Ouafi-Phan privacy model; GNY logic; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through analyzing the security of LMAP protocol, we point out that this protocol is vulnerable to several attacks including the data integrity, reader impersonation and traceability, forward traceability. Based on the above security drawbacks, an improved LAMP protocol is proposed. Aiming at the problem of data integrity, the backend server uses message authentication code to encrypt data information of tag; the reader mixes message generated by tag side to ensure resist impersonation reader attack; the tag side introduces blind factor against traceability attack; in addition, the keys of tags and backend server side can be updated dynamically according to the random number generated by tag side in different authentication cycles, to ensure the forward/backward privacy. The formal proof of correctness of the improved protocol is given based on GNY logic, and shows that the improved protocol resists various attack.
引用
收藏
页码:7292 / 7297
页数:6
相关论文
共 50 条
  • [31] Passive Attack on RFID LMAP plus plus Authentication Protocol
    Wang, Shao-hui
    Zhang, Wei-wei
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 185 - 193
  • [32] Another Improvement of LMAP plus plus : An RFID Authentication Protocol
    Huang, Anqi
    Zhang, Chen
    Tang, Chaojing
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 100 - 106
  • [33] Cryptanalysis and improvement of a group RFID authentication protocol
    Nasrollah Pakniat
    Ziba Eslami
    Wireless Networks, 2020, 26 : 3363 - 3372
  • [34] Cryptanalysis and improvement of a group RFID authentication protocol
    Pakniat, Nasrollah
    Eslami, Ziba
    WIRELESS NETWORKS, 2020, 26 (05) : 3363 - 3372
  • [35] ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    Chien, Hung-Yu
    Laih, Chi-Sung
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) : 848 - 853
  • [36] An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    Sharma, Surbhi
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, : 803 - 818
  • [37] A privacy-preserving lightweight authentication protocol for low-cost RFID tags
    Yu, Shucheng
    Ren, Kui
    Lou, Wenjing
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2939 - +
  • [38] EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
    Peris-Lopez, Pedro
    Cesar Hernandez-Castro, Julio
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 352 - +
  • [39] A Validated Lightweight Authentication Protocol Towards Commercial Low-Cost RFID Tags
    Mpalane, Kealeboga
    Singano, Zothile
    Lefophane, Samuel
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 260 - 267
  • [40] A Low-cost PKC-based RFID Authentication Protocol and Its Implementation
    Wei, Lili
    Luo, Zhaotong
    Qu, Qiang
    He, Qing
    Xu, Jingwei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 415 - 419