Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol

被引:0
|
作者
Li, Jing [1 ]
Zhou, Zhiping [1 ]
Wang, Ping [1 ]
机构
[1] Jiangnan Univ, Minist Educ, Engn Res Ctr Internet Things Technol Applicat, Wuxi 214122, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
RFID; forward privacy; backward privacy; Ouafi-Phan privacy model; GNY logic; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through analyzing the security of LMAP protocol, we point out that this protocol is vulnerable to several attacks including the data integrity, reader impersonation and traceability, forward traceability. Based on the above security drawbacks, an improved LAMP protocol is proposed. Aiming at the problem of data integrity, the backend server uses message authentication code to encrypt data information of tag; the reader mixes message generated by tag side to ensure resist impersonation reader attack; the tag side introduces blind factor against traceability attack; in addition, the keys of tags and backend server side can be updated dynamically according to the random number generated by tag side in different authentication cycles, to ensure the forward/backward privacy. The formal proof of correctness of the improved protocol is given based on GNY logic, and shows that the improved protocol resists various attack.
引用
收藏
页码:7292 / 7297
页数:6
相关论文
共 50 条
  • [41] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [42] Low cost minimal mutual authentication protocol for RFID
    Zhang, Xiang
    Baciu, George
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 620 - +
  • [43] A Secure RFID Authentication Protocol with Low Communication Cost
    Rahman, Mohammad Shahriar
    Soshi, Masakazu
    Miyaji, Atsuko
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 559 - +
  • [44] Design of a Security Protocol for Low-cost RFID
    Xu, Yuanzhong
    He, Zhangqing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [45] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    Wireless Personal Communications, 2024, 138 (04) : 2613 - 2635
  • [46] Low-cost Authentication Protocol of RFID System Using One Block Hash Function
    Jin, Shi-mei
    You, Mo
    Li, Yong-zhen
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 671 - 676
  • [47] ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags
    Li Jian
    Song Danjie
    Guo Xiaojing
    Xie Feng
    Peng Yong
    CHINA COMMUNICATIONS, 2011, 8 (07) : 122 - 127
  • [48] Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags
    Rizomiliotis, Panagiotis
    Rekleitis, Evangelos
    Gritzalis, Stefanos
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (04) : 274 - 276
  • [49] MUTUAL AUTHENTICATION PROTOCOL BASED ON TAG ID NUMBER UPDATING FOR LOW-COST RFID
    Gu, Yonghao
    Wu, Weiming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 548 - 551
  • [50] An Enhanced Security Authentication Protocol Based on Hash-Lock for Low-cost RFID
    Ouyang Changqing
    Wu Jixiong
    Li Zhengyan
    Huang Shengye
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 416 - +