Improving the Security of a Low-cost Tag Search Protocol

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 307

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JECEI-9-1_003

تاریخ نمایه سازی: 1 اردیبهشت 1400

چکیده مقاله:

Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among a large number of tags. Numerous works have been done about authentication and ownership protocols, but the number of researches done in the tag searching area is much less. Although security is a paramount factor in search protocols, but these days designers are looking for a secure search protocol that is also low cost. One way to have a low cost search protocol is that to be compatible with EPC C1G2 standard, which is an electronic product code class 1 generation 2 that works in the 860-960 MHz frequency range. Methods: Most recently, Sundaresan et al. have proposed an RFID tag search protocol based on quadratic residues and 128 bit pseudo random number generators and XOR operation that can be easily implemented on passive tags and is compatible with EPC C1G2 standard. We show that this protocol is not immune against tag tracing, and try to improve the protocol in a way that traceability attack will not be applicable and the protocol stays low cost and EPC compatible. Results: Since the problem in Sundaresan et al.'s search protocol is due to the tag not being able to recognize the used queries from the new ones, we improved the protocol using a counter within the queries, so the tag will realize that the query is used or not. Then we analyze the security of the improved protocol and prove its formal and informal security against known attacks. Conclusion: In this paper, we firstly analyze the security of Sundaresan et al.'s search protocol and show that the search protocol is vulnerable to traceability attack with two different scenarios. Then we propose an improved search protocol that is secure against tracing the tags. Following that, we analyze the security of the improved search protocol.  

نویسندگان

S. Saderi Oskuiee

Department of Content Transfer Technology, Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran.

F. Moazami

Department of Content Transfer Technology, Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran.

G. Oudi Ghadim

Department of Content Transfer Technology, Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • [1] S. Lahiri, RFID sourcebook, IBM press, 2005. ...
  • [2] V. Chawla, D.S. Ha, “An overview of passive RFID," IEEE ...
  • [3] C.C. Tan, B. Sheng, Q. Li, “Secure and serverless RFID ...
  • [4] T.Y. Won, J.Y. Chun, D.H. Lee, “Strong authentication protocol for ...
  • [5] L. Chun, J. Hwang, D. Lee, “RFID tag search protocol ...
  • [6] Z. Kim, J. Kim, K. Kim, I. Choi, T. Shon, ...
  • [7] S. Sundaresan, R. Doss, W. Zhou, “A secure search protocol ...
  • [8] S. Sundaresan, R. Doss, S. Piramuthu, W. Zhou, “Secure tag ...
  • [9] S. Sundaresan, R. Doss, S. Piramuthu, W. Zhou, “A secure ...
  • [10] M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, J. C. ...
  • [11] L.C. Lin, S.C. Tsaur, S.-C, K.P. Chang, “Lightweight and serverless ...
  • [12] C. Mtita, M. Laurent, J. Delort, “Efficient serverless radiofrequency identification ...
  • [13] S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, T. Nakajima, ...
  • [14] Y. Zuo, “Secure and private search protocols for RFID systems,” ...
  • [15] E.-J. Yoon, “Cryptanalysis of an RFID tag search protocol preserving ...
  • [16] L. Kulseng, Z. Yu, Y. Wei, Y. Guan, “Lightweight secure ...
  • [17] A. Falahati, H. Azizi, R.M. Edwards. “RFID light weight server-less ...
  • [18] C. Lv, H. Li, M. Jianfeng, B. Niu, “Vulnerability analysis ...
  • [19] M. Eslamnezhad Namin, M. Hosseinzadeh, N. Bagheri, A. Khademzadeh, “RSPAE: ...
  • [20] A. Khattab, Z. Jeddi, E. Amini, E., M. Bayoumi, RFID ...
  • [21] B. Gesuale, P. Agarwal, RFID: READ MY CHIPS!. Piper Jaffray ...
  • [22] H. Jannati, B. Bahrak, “Security analysis of an RFID tag ...
  • [23] M. Eslamnezhad Namin, M. Hosseinzadeh, N. Bagheri, A. Khademzadeh, “A ...
  • [24] L. Gong, R. Needham, R. Yahalom, “Reasoning about Belief in ...
  • نمایش کامل مراجع