Mouza Ahmad Bani Shemaili, C. Yeun, M. Zemerly, Khalid Mubarak
{"title":"Enhancing the Security of the Shrinking Generator Based Lightweight Mutual Authentication RFID Protocol","authors":"Mouza Ahmad Bani Shemaili, C. Yeun, M. Zemerly, Khalid Mubarak","doi":"10.1080/2287108X.2012.11006068","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identification (RFID) is a low computation power devices used to identify objects or subjects. Thus the low power devices suffer from major security issues, especially in the areas of privacy and authentication. Therefore, researchers tried to suggest lightweight cryptography protocols. This paper suggests an improvement for the lightweight mutual authentication proposed protocol using Shrinking Generator (SG) by Shemaili et al. since the protocol is vulnerable to a serious attack that can expose the tag data and compromise it. Also, the paper presents a scenario about securing the airport environment using the SG-Based protocol.","PeriodicalId":276731,"journal":{"name":"International Journal of Advanced Logistics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Logistics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/2287108X.2012.11006068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Radio Frequency Identification (RFID) is a low computation power devices used to identify objects or subjects. Thus the low power devices suffer from major security issues, especially in the areas of privacy and authentication. Therefore, researchers tried to suggest lightweight cryptography protocols. This paper suggests an improvement for the lightweight mutual authentication proposed protocol using Shrinking Generator (SG) by Shemaili et al. since the protocol is vulnerable to a serious attack that can expose the tag data and compromise it. Also, the paper presents a scenario about securing the airport environment using the SG-Based protocol.