شماره ركورد كنفرانس :
3704
عنوان مقاله :
تحليل امنيت و حريم خصوصي در پروتكل هاي احراز اصالت بر مبناي توابع در هم ساز در سامانه RFID
عنوان به زبان ديگر :
Formal security and privacy analysis and improvements of RFID hash-based authentication protocol
پديدآورندگان :
Rezaei Arezoo a.rezaei9045@yahoo.com , shahr-e-rey Branch, Islamic Azad University, , Alagheband Mahdi R m.alaghband@srbiau.ac.ir Science and Research Branch, Islamic Azad University
تعداد صفحه :
11
كليدواژه :
پروتكل هاي احراز هويت بر مبناي امواج راديويي , امنيت , رديابي , مدل امنيتي وودني
سال انتشار :
1396
عنوان كنفرانس :
پنجمين كنفرانس بين المللي در مهندسي برق و كامپيوتر با تاكيد بر دانش بومي
زبان مدرك :
انگليسي
چكيده فارسي :
Radio Frequency IDentification (RFID) technology has been used in most applications for authentication and authorization. However, RFID systems can be traced by an adversary. Many protocols have been proposed to improve the efficiency, security and privacy requirements of RFID. Most of protocols are vulnerable to desynchronization, impersonation, replay, and traceability attacks. In this paper, we prove that the new hash function-based protocol proposed by Zhang Xiaohong is insecure against the impersonation, replay, data desynchronization, traceability, and forward/backward traceability attacks. Also, we apply simulation based privacy model proposed by Vaudenay to analyze privacy aspects. The protocol cannot support any level of privacy as well.Then we propose an improved protocol to prevent the mentioned attacks and guarantee both security and privacy.
چكيده لاتين :
Radio Frequency IDentification (RFID) technology has been used in most applications for authentication and authorization. However, RFID systems can be traced by an adversary. Many protocols have been proposed to improve the efficiency, security and privacy requirements of RFID. Most of protocols are vulnerable to desynchronization, impersonation, replay, and traceability attacks. In this paper, we prove that the new hash function-based protocol proposed by Zhang Xiaohong is insecure against the impersonation, replay, data desynchronization, traceability, and forward/backward traceability attacks. Also, we apply simulation based privacy model proposed by Vaudenay to analyze privacy aspects. The protocol cannot support any level of privacy as well.Then we propose an improved protocol to prevent the mentioned attacks and guarantee both security and privacy.
كشور :
ايران
لينک به اين مدرک :
بازگشت