Simulation-Based Traceability Analysis of RFID Authentication Protocols

被引:17
|
作者
Alagheband, Mahdi R. [1 ]
Aref, Mohammad R. [2 ]
机构
[1] Islamic Azad Univ, Dept Elect Engn, Shahre Rey Branch, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur ISSL Lab, Tehran, Iran
关键词
RFID systems; Privacy models; Authentication protocol; Traceability; MUTUAL AUTHENTICATION; PRIVACY;
D O I
10.1007/s11277-013-1552-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays low-cost RFID systems have moved from obscurity into mainstream applications which cause growing security and privacy concerns. The lightweight cryptographic primitives and authentication protocols are indispensable requirements for these devices to grow pervasive. In recent years, there has been an increasing interest in intuitive analysis of RFID protocols. This concept has recently been challenged by formal privacy models. This paper investigates how to analyse and solve privacy problems in formal model. First, we highlight some vague drawbacks especially in forward and backward traceability analysis and extend it in the simulation-based privacy model family. Then, the privacy weaknesses of three new-found RFID authentication protocols are analysed in formal privacy models and three improved protocols are proposed to prevent the aforementioned attacks.
引用
下载
收藏
页码:1019 / 1038
页数:20
相关论文
共 50 条
  • [1] Simulation-Based Traceability Analysis of RFID Authentication Protocols
    Mahdi R. Alagheband
    Mohammad R. Aref
    Wireless Personal Communications, 2014, 77 : 1019 - 1038
  • [2] Traceability Analysis of Recent RFID Authentication Protocols
    Seyed Mohammad Alavi
    Karim Baghery
    Behzad Abdolmaleki
    Mohammad Reza Aref
    Wireless Personal Communications, 2015, 83 : 1663 - 1682
  • [3] Traceability Analysis of Recent RFID Authentication Protocols
    Alavi, Seyed Mohammad
    Baghery, Karim
    Abdolmaleki, Behzad
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 1663 - 1682
  • [4] Traceability Analysis of Quadratic Residue-Based RFID Authentication Protocols
    Sohrabi-Bonab, Zahra
    Alagheband, Mahdi R.
    Aref, Mohammad Reza
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 61 - 68
  • [5] On the Traceability of Tags in SUAP RFID Authentication Protocols
    Safkhani, Masoumeh
    Bagheri, Nasour
    Peris-Lopez, Pedro
    Mitrokotsa, Aikaterini
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [6] Securing RFID tags: Authentication protocols with completeness, soundness, and non-traceability
    Zhu, Huafei
    Bao, Feng
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2700 - 2704
  • [7] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920
  • [8] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [9] Untraceability Analysis of Two RFID Authentication Protocols
    CHEN Xiuqing
    CAO Tianjie
    ZHAI Jingxuan
    Chinese Journal of Electronics, 2016, 25 (05) : 912 - 920
  • [10] A Simulation-based Performance Evaluation of Anti-collision Protocols for RFID System
    Xie, Zheng
    Wang, Xin'an
    Li, Qiuping
    2014 IEEE INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2014,