The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
An Improved Lightweight RFID Authentication Protocol
|
Author(s): Xiaowen Zhang (College of Staten Island – CUNY, USA), Zhanyang Zhang (College of Staten Island – CUNY, USA)and Xinzhou Wei (New York City College of Technology – CUNY, USA)
Copyright: 2013
Pages: 9
Source title:
Technological Solutions for Modern Logistics and Supply Chain Management
Source Author(s)/Editor(s): ZongWei Luo (The University of Hong Kong, China)
DOI: 10.4018/978-1-4666-2773-4.ch001
Purchase
|
Abstract
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, thereby significantly strengthening the security of the protocol without introducing extra resource cost.
Related Content
Hamed Nozari.
© 2024.
13 pages.
|
Maryam Rahmaty.
© 2024.
13 pages.
|
Mahmonir Bayanati.
© 2024.
13 pages.
|
Kamalendu Pal.
© 2024.
33 pages.
|
Kamalendu Pal.
© 2024.
35 pages.
|
Aminmasoud Bakhshi Movahed, Ali Bakhshi Movahed, Hamed Nozari.
© 2024.
31 pages.
|
Esmael Najafi, Iman Atighi.
© 2024.
11 pages.
|
|
|