Breaking anonymity of some recent lightweight RFID authentication protocols

Baghery, K ; Sharif University of Technology | 2018

627 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s11276-018-1717-0
  3. Publisher: Springer New York LLC , 2018
  4. Abstract:
  5. Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks (2016). We show that none of the studied protocols provides the desired security and privacy required by the end-users. We present various security and privacy attacks such as secret parameter reveal, impersonation, DoS, traceability, and forward traceability against the studied protocols. Our attacks are mounted in the Ouafi–Phan RFID formal privacy model which is a modified version of well-known Juels–Weis privacy model. © 2018 Springer Science+Business Media, LLC, part of Springer Nature
  6. Keywords:
  7. Anonymous RFID authentication protocol ; Hash functions ; Internet of things (IoT) ; Ouafi–Phan privacy model ; Security and privacy ; Authentication ; Cellular radio systems ; Data privacy ; Hash functions ; Internet protocols ; Network protocols ; Network security ; Personal communication systems ; Personal computers ; Internet of Things (IOT) ; Novel applications ; Privacy models ; RFID authentication ; Rfid authentication protocols ; Secret parameters ; Security and privacy ; Wireless personal communications ; Radio frequency identification (RFID)
  8. Source: Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN)
  9. URL: https://link.springer.com/article/10.1007%2Fs11276-018-1717-0