Loading...

Securing key exchange and key agreement security schemes for RFID passive tags

Abdolmaleki, B ; Sharif University of Technology | 2016

551 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/IranianCEE.2016.7585754
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2016
  4. Abstract:
  5. In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability attacks on Zhang et al's protocol with success probability '1', and also we show that an attacker can impersonate the tag and the reader of Kim's protocol both with success probabilities '1/4'. We also present some modifications on the structure of studied schemes and propose two modified schemes which overcome all the discovered flaws. Finally, the improved protocols are compared with some similar protocols in terms of security and privacy. © 2016 IEEE
  6. Keywords:
  7. EPC C1 G2 standard ; Key Exchange Protocol ; privacy ; RFID ; Security ; Data privacy ; Electrical engineering ; Mathematical techniques ; Key agreement protocol ; Key exchange protocols ; Modified scheme ; Nocv1 ; Secret parameters ; Security and privacy ; Security scheme ; Traceability attacks ; Radio frequency identification (RFID)
  8. Source: 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1475-1480 ; 9781467387897 (ISBN)
  9. URL: http://ieeexplore.ieee.org/document/7585754