{"title":"An AKARI-based Secure Communication Scheme for EPC Tags","authors":"Karim Baghery, B. Abdolmaleki","doi":"10.1109/RTUWO.2017.8228535","DOIUrl":null,"url":null,"abstract":"Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication protocol which is proposed for RFID tags consistent with EPC Class 1 Generation 2 standard. Our analysis show that however the authors have tried to improve the original protocol and make it secure against various active and passive attacks, but still their improved version has some serious drawbacks which make it vulnerable to traceability and forward traceability privacy attacks. Our attacks are mounted in the Ouafi and Phan's RFID formal privacy model which is an extended version of Juels and Weis's well-known privacy model. Finally, we modify the structure of analyzed protocol and propose a revised version which prevents all discovered attacks.","PeriodicalId":183694,"journal":{"name":"2017 Advances in Wireless and Optical Communications (RTUWO)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Advances in Wireless and Optical Communications (RTUWO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTUWO.2017.8228535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication protocol which is proposed for RFID tags consistent with EPC Class 1 Generation 2 standard. Our analysis show that however the authors have tried to improve the original protocol and make it secure against various active and passive attacks, but still their improved version has some serious drawbacks which make it vulnerable to traceability and forward traceability privacy attacks. Our attacks are mounted in the Ouafi and Phan's RFID formal privacy model which is an extended version of Juels and Weis's well-known privacy model. Finally, we modify the structure of analyzed protocol and propose a revised version which prevents all discovered attacks.