Formal Analysis and Verification for Three-Party Authentication Protocol of RFID

被引:1
|
作者
Chen, Jia [1 ]
Xiao, Meihua [1 ]
Yang, Ke [1 ]
Li, Wei [2 ]
Zhong, Xiaomei [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
[2] CRRC Zhuzhou Locomot Co Ltd, Intelligent Network Res & Dev Dept, Zhuzhou 412001, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
RFID three-party authentication protocol; Model checking; Multi-channel modeling; SECURITY;
D O I
10.1007/978-981-13-2712-4_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID three-party authentication protocol based on NTRU cryptosystem is a type of multi-entities authentication protocol. Unlike other RFID mutual authentication protocols, this protocol realizes mutual authentication of Server to Reader, and Server to Tag. Model checking is a formal method to check the correctness specifications hold in each state on concurrent and distributed systems, which can be used to verify the security of network protocol. A multi-channels constructing method is proposed to build this protocol model for formal analysis, then authentication property of the protocol is verified by model checker SPIN. Formal verification result reveals that an attack exists in this protocol, hence the protocol cannot guarantee the security of the three-party authentication protocol. The modeling method proposed above has great significance on security analysis for such three-party authentication protocols.
引用
收藏
页码:46 / 60
页数:15
相关论文
共 50 条
  • [1] Three-party Authentication Protocol Based on Riro for Mobile RFID System
    Xu, Sheng-Hua
    [J]. International Journal of Network Security, 2024, 26 (01) : 1 - 9
  • [2] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    [J]. THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [3] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
    Xie, Qi
    Dong, Na
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
  • [4] A Note on An Enhanced Three-Party Authentication Key Exchange Protocol
    Tan, Zuowen
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1367 - 1372
  • [5] A Stronger Formal Security Model of Three-party Authentication and Key Distribution Protocol for 802.11i
    Tao Wenjun
    Hu Bin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 163 - 173
  • [6] FORMAL ANALYSIS OF A NOVEL RFID AUTHENTICATION PROTOCOL
    Chikouche, Noureddine
    [J]. 2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [7] Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
    Guo, Songhui
    Song, Yunfan
    Guo, Song
    Yang, Yeming
    Song, Shuaichao
    [J]. SYMMETRY-BASEL, 2023, 15 (09):
  • [8] Improved key exchange protocol for three-party based on verifier authentication
    Computer Center, Northeastern University, Shenyang 110004, China
    不详
    [J]. J. Southeast Univ. Engl. Ed., 2008, 3 (322-324):
  • [9] A Secure Three-Party Authentication Protocol for Wireless Body Area Networks
    Vishwakarma, Rahul
    Mohapatra, Ramesh Kumar
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 99 - 103
  • [10] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    [J]. SENSOR LETTERS, 2013, 11 (05) : 990 - 996