Title of article :
ALightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags
Author/Authors :
Abdellahi Khorasgani, Alireza Department of Electrical Engineering - Khorasgan (Isfahan) Branch Islamic Azad University, Isfahan, Iran , Sajadieh, Mahdi Department of Electrical Engineering - Khorasgan (Isfahan) Branch Islamic Azad University, Isfahan, Iran , Yazdani, Mohammad rooholah Department of Electrical Engineering - Khorasgan (Isfahan) Branch Islamic Azad University, Isfahan, Iran
Pages :
16
From page :
71
To page :
86
Abstract :
Rapid and ever-increasing Internet of things (IoT) developments have brought about great hopes of improving the quality of human life. Radio-frequency identication (RFID) employed as a backup technology in the IoT is widely used in different aspects of life. Therefore, high priority should be given to security problems and user privacy protection. However, limited computational power and storage resources in passive tags have made the implementation of security measures diffcult in RFID. In other words, the design of lightweight authentication protocols for RFID systems is still a major challenge in RFID security. A lightweight authentication protocol has been recently proposed for passive tags by Liu et al. Using specic inverse operations in the IOLAS protocol, they claimed that the lightweight bitwise operations would make this protocol resistant against known and potential attacks in RFID systems. This study aimed to show that the same inverse operations pose the main problem so that this protocol fails to guarantee backward security. It was also indicated that the IOLAS protocol is vulnerable to replay, reader impersonation, tag tracking attacks, and secret disclosure attack. Finally, we improved the IOLAS protocol and proposed the POLAS protocol, which is resistant to the currently known attacks. We analyze the security level of the proposed protocols and prove the security of the proposed design using BAN (Burrows-Abadi-Needham) logic. We also formally conrmed the security of the proposal using the Scyther simulation tool. According to security analysis, we can observe that this protocol have a high level of security. A comparison of the performance of the POLAS protocol shows that this protocol is comparable to similar protocols in terms of computational costs, storage costs, and communication costs.
Keywords :
Tag tracking , Reader impersonation , Replay attacks , RFID
Journal title :
Journal of Computing and Security
Serial Year :
2021
Record number :
2703882
Link To Document :
بازگشت