{"title":"基于akari的EPC标签安全通信方案","authors":"Karim Baghery, B. Abdolmaleki","doi":"10.1109/RTUWO.2017.8228535","DOIUrl":null,"url":null,"abstract":"Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication protocol which is proposed for RFID tags consistent with EPC Class 1 Generation 2 standard. Our analysis show that however the authors have tried to improve the original protocol and make it secure against various active and passive attacks, but still their improved version has some serious drawbacks which make it vulnerable to traceability and forward traceability privacy attacks. Our attacks are mounted in the Ouafi and Phan's RFID formal privacy model which is an extended version of Juels and Weis's well-known privacy model. Finally, we modify the structure of analyzed protocol and propose a revised version which prevents all discovered attacks.","PeriodicalId":183694,"journal":{"name":"2017 Advances in Wireless and Optical Communications (RTUWO)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An AKARI-based Secure Communication Scheme for EPC Tags\",\"authors\":\"Karim Baghery, B. Abdolmaleki\",\"doi\":\"10.1109/RTUWO.2017.8228535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication protocol which is proposed for RFID tags consistent with EPC Class 1 Generation 2 standard. Our analysis show that however the authors have tried to improve the original protocol and make it secure against various active and passive attacks, but still their improved version has some serious drawbacks which make it vulnerable to traceability and forward traceability privacy attacks. Our attacks are mounted in the Ouafi and Phan's RFID formal privacy model which is an extended version of Juels and Weis's well-known privacy model. Finally, we modify the structure of analyzed protocol and propose a revised version which prevents all discovered attacks.\",\"PeriodicalId\":183694,\"journal\":{\"name\":\"2017 Advances in Wireless and Optical Communications (RTUWO)\",\"volume\":\"109 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Advances in Wireless and Optical Communications (RTUWO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RTUWO.2017.8228535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Advances in Wireless and Optical Communications (RTUWO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTUWO.2017.8228535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An AKARI-based Secure Communication Scheme for EPC Tags
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication protocol which is proposed for RFID tags consistent with EPC Class 1 Generation 2 standard. Our analysis show that however the authors have tried to improve the original protocol and make it secure against various active and passive attacks, but still their improved version has some serious drawbacks which make it vulnerable to traceability and forward traceability privacy attacks. Our attacks are mounted in the Ouafi and Phan's RFID formal privacy model which is an extended version of Juels and Weis's well-known privacy model. Finally, we modify the structure of analyzed protocol and propose a revised version which prevents all discovered attacks.