• DocumentCode
    182279
  • Title

    Vulnerabilities of RFID Security Protocol Based on Chaotic Maps

  • Author

    Akgun, Mete ; Uekae, Tubitak ; Caglayan, M. Ufuk

  • Author_Institution
    Tubitak UEKAE, Gebze, Turkey
  • fYear
    2014
  • fDate
    21-24 Oct. 2014
  • Firstpage
    648
  • Lastpage
    653
  • Abstract
    Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based on symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. Al have proposed an RFID security protocol based on chaotic maps. In this paper, we analyse the security of this protocol and discover its vulnerabilities. We firstly present a de-synchronization attack in which a passive adversary makes the shared secrets out-of-synchronization by eavesdropping just one protocol session. We secondly present a secret disclosure attack in which a passive adversary extracts secrets of a tag by eavesdropping just one protocol session. An adversary having the secrets of the tag can launch some other attacks. Finally, we propose modifications to Cheng et. Al´s protocol to eliminate its vulnerabilities.
  • Keywords
    chaos; cryptographic protocols; radiofrequency identification; RFID authentication protocols; RFID security protocol; RFID tags; chaotic maps; desynchronization attack; out-of-synchronization; passive adversary; protocol session; secret disclosure attack; secret extraction; shared secrets; Authentication; Chebyshev approximation; Privacy; Protocols; Radiofrequency identification; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Protocols (ICNP), 2014 IEEE 22nd International Conference on
  • Conference_Location
    Raleigh, NC
  • Print_ISBN
    978-1-4799-6203-7
  • Type

    conf

  • DOI
    10.1109/ICNP.2014.103
  • Filename
    6980442