Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks

被引:0
|
作者
Syafrilah, Zianita [1 ]
Permana, Anang Adi [2 ]
Handayani, Annisa Dini [1 ]
机构
[1] Sekolah Tinggi Sandi Negara, Cryptog Engn, Bogor, Indonesia
[2] Sekolah Tinggi Sandi Negara, Hardware Cryptog Engn, Bogor, Indonesia
关键词
RFID; RAP-WOTA; Scyther; authentication; MTM; replay;
D O I
10.1109/iwbis.2019.8935836
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID is a technology that utilizes radio waves to communicate and transmit data. The components involved in this communication process are tag, reader, and server. These three components must verify each other to ensure the authenticity of the components. Rajaguru K. and R.C Hansdah proposed an authentication protocol called RFID Authentication Encryption Protocol Without Tag Anonymity (RAP-WOTA). The protocol is claimed to fulfill key confidentiality, message confidentiality, message authenticity, tag anonymity, de-synchronization, mutual authentication, forward secrecy, and resistant to Man-in The-Middle (MTM) and replay attacks. Although it was claimed that RAP WOTA is secure against MTM and replay attacks, an analysis of RAP-WOTA using Scyther Tool shows that RAP-WOTA is vulnerable to MTM and replay attacks. In this paper we proposed modified RAP-WOTA that prevent MTM and replay attacks by adding some nonces or timestamps. Analyzing using Scyther Tool showed that this modification is secure against MTM and replay attacks.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [1] Access Control Prototype using Modified RAP-WOTA with Timestamp Protocol Based on Arduino Mega 2560
    Hindarsih, Nia
    Novazrianto, Dwi
    Setiawan, Fauzan Budi
    Hartadi, Esa Egistian
    Khairunnisa, Rizka
    [J]. 2021 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET), 2021, : 250 - 255
  • [2] Preventing Replay Attacks on Speaker Verification Systems
    Villalba, Jesus
    Lleida, Eduardo
    [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [3] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [4] Preventing replay attacks for secure routing in ad hoc networks
    Zhen, J
    Srinivas, S
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 140 - 150
  • [5] Enhanced ARP: Preventing ARP Poisoning-Based Man-in-the-Middle Attacks
    Nam, Seung Yeob
    Kim, Dongwon
    Kim, Jeongeun
    [J]. IEEE COMMUNICATIONS LETTERS, 2010, 14 (02) : 187 - 189
  • [6] Preventing delegation-based mobile authentications from man-in-the-middle attacks
    Lu, Jian-Zhu
    Zhou, Jipeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2012, 34 (03) : 314 - 326
  • [7] Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication
    Braun, Johannes
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 510 - 511
  • [8] Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
    Pietrzak, Krzysztof
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 3 - 15
  • [9] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [10] Man in the middle attacks on Bluetooth
    Kügler, D
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 149 - 161