首页> 外文会议>2012 International Conferece For Internet Technology And Secured Transactions. >Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer
【24h】

Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer

机译:RAPP和Gossamer这两种超轻量RFID身份验证协议的漏洞分析

获取原文
获取原文并翻译 | 示例

摘要

The available energy and computational resources needed for privacy and authentication in RFID systems are limited. In recent years, a new track of research investigated the feasibility of using ultra-lightweight protocols that are based on simple operations to provide the required privacy and mutual authentication functionality while meeting the stringent constraints. Several ideas were proposed and evaluated in an informal way by stating the message exchanges without considering the validity of the assumptions nor the correctness of the messages exchanged. Subsequent research efforts showed that most of these protocols were vulnerable to one attack or more. In this paper, we consider two ultra-lightweight mutual authentication protocols that were shown to be vulnerable to the full disclosure and de-synchronization attacks; respectively. The protocols are formally analyzed using GNY logic to explain the incorrect assumptions of the protocols, how these assumption were exploited, and how they could have been avoided.
机译:RFID系统中进行隐私和身份验证所需的可用能量和计算资源有限。近年来,一条新的研究轨迹研究了使用超轻量协议的可行性,该协议基于简单的操作以提供所需的隐私和相互身份验证功能,同时满足严格的限制。通过陈述消息交换而以非正式的方式提出并评估了一些想法,而没有考虑假设的有效性或所交换消息的正确性。随后的研究工作表明,这些协议大多数都容易受到一种或多种攻击。在本文中,我们考虑了两个超轻量级相互身份验证协议,它们被证明容易受到完全公开和非同步攻击的攻击。分别。使用GNY逻辑对协议进行正式分析,以解释协议的错误假设,如何利用这些假设以及如何避免它们。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号