Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard

Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang
{"title":"Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard","authors":"Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang","doi":"10.1109/IACS.2017.7921977","DOIUrl":null,"url":null,"abstract":"As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th International Conference on Information and Communication Systems (ICICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IACS.2017.7921977","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
防范假冒攻击者:一种基于标准的高效RFID互认证协议
随着基于RFID技术的物联网(loT)受到广泛关注,为应对其在日常生活中快速增长的应用,各种安全协议应运而生。但是,这些协议大多受到标签处理能力和传输过程中的危险暴露的限制,只能应用于某些领域。此前,Chen和Deng的相互认证和隐私保护协议符合EPC第1代第2代标准,具有低成本和对标签处理能力要求低的特点。然而,根据其他人的报道,该系统面临着通过模仿攻击跟踪或克隆标签的严重危险。经过仔细审查,我们发现这些漏洞在于对随机数的保护不足,我们在原始协议的基础上重构了请求和响应,使消息不可重复,关键元素保密,并增加了小的存储空间进行比较。通过Ban逻辑分析证明了协议的安全性,该协议采用密钥对和动态随机数双重保护。对比结果表明,我们的协议不仅在原有协议保证的传统攻击下是安全的,而且克服了冒名攻击所代表的信息公开暴露的固有弱点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using behaviour-driven development with hardware-software co-design for autonomous load management Efficient 3D placement of a UAV using particle swarm optimization A brain friendly tool to facilitate research-teaching nexus: Mind maps HidroMORE 2: An optimized and parallel version of HidroMORE Comparative analysis of MCDM methods for product aspect ranking: TOPSIS and VIKOR
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1