首页> 外文OA文献 >Security attacks and enhancements to chaotic map-based RFID authentication protocols
【2h】

Security attacks and enhancements to chaotic map-based RFID authentication protocols

机译:对基于混沌映射的RFID认证协议的安全攻击和增强

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis of these protocols and uncover their weaknesses. We prove that these protocols are vulnerable to tag tracing, tag impersonation and desynchronization attacks. The attack complexity of an adversary is polynomial and the success probability of these attacks are substantial. Moreover, we also propose an improved RFID authentication protocol that employs Chebyshev chaotic maps and complies with the EPC global Class 1 Generation 2 standard. Finally, we show that our protocol is resistant against those security issues.
机译:射频识别(RFID)技术已越来越多地集成到众多用于对象或个人身份验证的应用程序中。但是,由于其有限的计算能力,RFID技术可能会引起一些安全性和隐私问题,例如跟踪标签的所有者,标签的克隆等。最近,针对低成本提出了两种基于混沌地图的身份验证协议RFID标签以消除这些问题。在本文中,我们对这些协议进行了安全性分析,并揭示了它们的弱点。我们证明了这些协议容易受到标签跟踪,标签模拟和不同步攻击的攻击。攻击者的攻击复杂度是多项式,并且这些攻击的成功概率很大。此外,我们还提出了一种改进的RFID身份验证协议,该协议采用了切比雪夫(Chebyshev)混沌图并符合EPC全球1类第2代标准。最后,我们证明了我们的协议可以抵抗这些安全问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号