首页    期刊浏览 2024年11月27日 星期三
登录注册

文章基本信息

  • 标题:The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
  • 本地全文:下载
  • 作者:Zhicai Shi ; Shitao Ren ; Fei Wu
  • 期刊名称:Journal of Computer and Communications
  • 印刷版ISSN:2327-5219
  • 电子版ISSN:2327-5227
  • 出版年度:2016
  • 卷号:04
  • 期号:08
  • 页码:1-9
  • DOI:10.4236/jcc.2016.48001
  • 语种:English
  • 出版社:Scientific Research Publishing
  • 摘要:The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most effective methods to ensure the security in the RFID system. Many light-weight authentication protocols use Hash function and pseudorandom generator to ensure the anonymity and confidential communication of the RFID system. But these protocols do not provide such security as they claimed. By analyzing some typical Hash-based RFID authentication protocols, it is found that they are vulnerable to some common attacks. Many protocols cannot resist tracing attack and de-synchronization attack. Some protocols cannot provide forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based authentication protocol and they claimed their protocol could resist the well-known attacks. But by constructing some different attack scenarios, their protocol is shown to be vulnerable to tracing attack and de-synchronization attack. Based on the analysis for the Hash-based authentication protocols, some feasible suggestions are proposed to improve the security of the RFID authentication protocols.
  • 关键词:RFID;Authentication Protocol;Vulnerability;Hash Function;Security and Privacy
国家哲学社会科学文献中心版权所有