Untraceability Analysis of Two RFID Authentication Protocols

被引:5
|
作者
Chen Xiuqing [1 ,2 ]
Cao Tianjie [1 ]
Zhai Jingxuan [1 ]
机构
[1] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Peoples R China
[2] Xuzhou Med Univ, Sch Med Informat, Xuzhou 221000, Peoples R China
关键词
Radio frequency identification (RFID); Forward untraceability; Backward untraceability; Impersonation attacks; Desynchronization attacks; SECURITY PROTOCOL; ACSP;
D O I
10.1049/cje.2016.08.013
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of Radio frequency identification (RFID) technologies, theoretical study on the protocol's design promotes the increasing reality applications of this product. The protocol designers attach significance to untraceability analysis on key-update RFID authentication protocols. This paper analyzes two RFID authentication protocols in terms of forward untraceability and backward untraceability, which are two necessary conditions for key-update RFID protocols and ownership transfer protocols. This paper introduces impersonation attacks as well as desynchronization attacks to two protocols. This paper presents two enhanced protocols, which can achieve forward untraceability and backward untraceability privacy. This paper shows the outstanding efficiency and security properties of two improved schemes through detailed analysis and comparisons.
引用
收藏
页码:912 / 920
页数:9
相关论文
共 50 条
  • [1] Untraceability Analysis of Two RFID Authentication Protocols
    CHEN Xiuqing
    CAO Tianjie
    ZHAI Jingxuan
    [J]. Chinese Journal of Electronics, 2016, 25 (05) : 912 - 920
  • [2] Untraceability of RFID protocols
    van Deursen, Ton
    Mauw, Sjouke
    Radomirovic, Sasa
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 1 - 15
  • [3] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [4] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
  • [5] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [6] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [7] Weaknesses in Two RFID Authentication Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmnohammed, Mohamed
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 162 - 172
  • [8] Security analysis of two recently proposed RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhao, Meng
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
  • [9] Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
    Farzaneh, Yousof
    Azizi, Mandi
    Dehkordi, Masoud
    Mirghadr, Abdolrasoul
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (04) : 340 - 345
  • [10] Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols
    Baghery, Karim
    Abdolmaleki, Behzad
    Akhbari, Bahareh
    Aref, Mohammad Reza
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 137 - 142