CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan, “Untraceability Analysis of Two RFID Authentication Protocols,” Chinese Journal of Electronics, vol. 25, no. 5, pp. 912-920, 2016, doi: 10.1049/cje.2016.08.013
Citation: CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan, “Untraceability Analysis of Two RFID Authentication Protocols,” Chinese Journal of Electronics, vol. 25, no. 5, pp. 912-920, 2016, doi: 10.1049/cje.2016.08.013

Untraceability Analysis of Two RFID Authentication Protocols

doi: 10.1049/cje.2016.08.013
Funds:  This work is supported by the Fundamental Research Funds for the Central Universities (No.2015XKMS086).
More Information
  • Corresponding author: CAO Tianjie (corresponding author) received the B.S. and M.S. degree in mathematics from Nankai University, Tianjin, China and the Ph.D. degree in computer software and theory from State Key Laboratory of Information Security of Institute of Software, Chinese Academy of Sciences, Beijing, China. He is now a professor of computer science in the School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China. His research interests include security protocols and network security. (Email:tjcao@cumt.edu.cn)
  • Received Date: 2014-07-07
  • Rev Recd Date: 2014-10-10
  • Publish Date: 2016-09-10
  • With the development of Radio frequency identification (RFID) technologies, theoretical study on the protocol's design promotes the increasing reality applications of this product. The protocol designers attach significance to untraceability analysis on key-update RFID authentication protocols. This paper analyzes two RFID authentication protocols in terms of forward untraceability and backward untraceability, which are two necessary conditions for key-update RFID protocols and ownership transfer protocols. This paper introduces impersonation attacks as well as desynchronization attacks to two protocols. This paper presents two enhanced protocols, which can achieve forward untraceability and backward untraceability privacy. This paper shows the outstanding efficiency and security properties of two improved schemes through detailed analysis and comparisons.
  • loading
  • O.K. Ha, et al., "Relation model describing the effects of introducing RFID in the supply chain:evidence from the food and beverage industry in South Korea", Personal and Ubiquitous Computing, Vol.18, No.3, pp.553-561, 2014.
    H. Fernando and J. Abawajy, "Mutual authentication protocol for networked RFID systems", Proc. of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference, New York, USA, pp.417-424, 2011.
    Z. Qian, et al., "ACSP:A novel security protocol against counting attacks for UHF RFID systems", Computers & Mathematics with Applications, Vol.63, No.2, pp.492-500, 2012.
    M. Safkhani, et al., "On the security of RFID anti-counting security protocol (ACSP)", Journal of Computational and Applied Mathematics, Vol.259, No.PartB, pp.512-521, 2014.
    H. Ning, et al., "Ultralightweight RFID Authentication Protocol Based on Random Partitions of Pseudorandom Identifier and Pre-shared Secret Value", Chinese Journal of Electronics, Vol.20, No.20, pp.228-232, 2011.
    M.R. Alagheband and M.R. Aref., "Simulation-based traceability analysis of RFID authentication protocols", Wireless Personal Communications, Vol.77, No.2, pp.1019-1038, 2014.
    D. Moriyama, Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, Berlin, German, pp.114-129, 2013.
    S. Kardaş, et al., Lightweight Cryptography for Security and Privacy, Springer Berlin Heidelberg, Berlin, German, pp.130-141, 2013.
    S. Vaudenay, Advances in Cryptology-ASIACRYPT 2007. Springer Berlin Heidelberg, Berlin, German, pp.68-87, 2007.
    L. Jian, et al., "ID updating-based RFID mutual authentication protocol for low-cost tags", China Communications, Vol.8, No.7, pp.122-127, 2011.
    K. Ouafi and R.C.W. Phan, Proc. of the Applied Cryptography and Network Security, Springer Berlin Heidelberg, Berlin, German, Vol.5037, No.7, pp.479-489, 2008.
    C.H. Lim and T. Kwon, Information and Communications Security, Springer Berlin Heidelberg, Berlin, German, pp.1-20, 2006.
    H.Y. Chien, et al., "Non-linearity cannot help RFID resist fulldisclosure attacks and terrorist fraud attacks", Security and Communication Networks, Vol.6, No.12, pp.1490-1495, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (433) PDF downloads(659) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return