Article (Scientific journals)
Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
Kardaş, Süleyman; Genç, Ziya Alper
2018In Wireless Personal Communications, 98 (1), p. 1135-1154
Peer Reviewed verified by ORBi
 

Files


Full Text
chaotic.pdf
Author postprint (218.06 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
RFID; Security; EPC Global; Chaotic map
Abstract :
[en] Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis of these protocols and uncover their weaknesses. We prove that these protocols are vulnerable to tag tracing, tag impersonation and desynchronization attacks. The attack complexity of an adversary is polynomial and the success probability of these attacks are substantial. Moreover, we also propose an improved RFID authentication protocol that employs Chebyshev chaotic maps and complies with the EPC global Class 1 Generation 2 standard. Finally, we show that our protocol is resistant against those security issues.
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA)
Disciplines :
Computer science
Author, co-author :
Kardaş, Süleyman
Genç, Ziya Alper ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
Publication date :
2018
Journal title :
Wireless Personal Communications
ISSN :
1572-834X
Publisher :
Springer US
Volume :
98
Issue :
1
Pages :
1135-1154
Peer reviewed :
Peer Reviewed verified by ORBi
Focus Area :
Security, Reliability and Trust
Available on ORBilu :
since 25 November 2017

Statistics


Number of views
93 (2 by Unilu)
Number of downloads
399 (0 by Unilu)

Scopus citations®
 
4
Scopus citations®
without self-citations
4
OpenCitations
 
2
WoS citations
 
3

Bibliography


Similar publications



Contact ORBilu