Loading...
Search for: secret-parameters
0.004 seconds

    Securing key exchange and key agreement security schemes for RFID passive tags

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1475-1480 ; 9781467387897 (ISBN) Abdolmaleki, B ; Baghery, K ; Akhbari, B ; Alavi, S. M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability attacks on Zhang et al's protocol with success probability '1', and also we show that an attacker can impersonate the tag and the reader of Kim's protocol both with success probabilities '1/4'. We also present some modifications on the structure of studied schemes and propose two modified schemes... 

    Cryptanalysis of two EPC-based RFID security schemes

    , Article 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 116-121 ; 9781467376099 (ISBN) Abdolmaleki, B ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Radio Frequency Identification (RFID) is an easy to use technology for quick and low-cost identification and authentication. Since RFID systems have found in various parts of our daily lives, security awareness about these systems has become one of the prominent topics for researchers. In this study, we investigate two RFID security schemes which both are under Electronic Product Code (EPC) standard. It is shown that both the analyzed protocols have some drawbacks and are vulnerable to several security attacks including secret parameters reveal, impersonation, reader forward secrecy and also one of them does not provide date integrity. In addition, in order to overcome all the discovered... 

    Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard

    , Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 111-116 ; 9781509034345 (ISBN) Abdolmaleki, B ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their protocol suffers from secret parameters reveal, tag impersonation attack, backward and forward traceability attacks. Then, in order to enhance the security and the privacy of this protocol, a modified version is proposed. In order to evaluate our proposed protocol, its security and privacy are... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks...