物联网中RFID标签互鉴协议的披露攻击防范

Hadeeqa Nasir, Nazish Kanwal, Musfirah
{"title":"物联网中RFID标签互鉴协议的披露攻击防范","authors":"Hadeeqa Nasir, Nazish Kanwal, Musfirah","doi":"10.1109/ICAEM.2018.8536304","DOIUrl":null,"url":null,"abstract":"Security of IoT is a major concern. These devices have simplified various tasks but if the information transmitted through IoT is not authorized and secure, then usage of IoT will be reduced. To solve this problem various algorithms have been proposed. A mutual authentication protocol for IoT devices using RFID tags was previously proposed. The protocol provides ultra-lightweight authentication based on computation power and storage capacity of entities involved. In this protocol, disclosure attack is possible because attacker can obtain the key that is computed between RFID tag and the reader. In this paper a method is proposed to protect the protocol against this attack.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"76 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Prevention of Disclosure Attack on a Mutual Authentication Protocol Using RFID Tag in IoT\",\"authors\":\"Hadeeqa Nasir, Nazish Kanwal, Musfirah\",\"doi\":\"10.1109/ICAEM.2018.8536304\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of IoT is a major concern. These devices have simplified various tasks but if the information transmitted through IoT is not authorized and secure, then usage of IoT will be reduced. To solve this problem various algorithms have been proposed. A mutual authentication protocol for IoT devices using RFID tags was previously proposed. The protocol provides ultra-lightweight authentication based on computation power and storage capacity of entities involved. In this protocol, disclosure attack is possible because attacker can obtain the key that is computed between RFID tag and the reader. In this paper a method is proposed to protect the protocol against this attack.\",\"PeriodicalId\":427270,\"journal\":{\"name\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"volume\":\"76 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAEM.2018.8536304\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEM.2018.8536304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网的安全性是一个主要问题。这些设备简化了各种任务,但如果通过物联网传输的信息未经授权和安全,那么物联网的使用将会减少。为了解决这个问题,人们提出了各种算法。之前提出了使用RFID标签的物联网设备的相互认证协议。该协议根据相关实体的计算能力和存储容量提供超轻量级认证。在该协议中,攻击者可以获得RFID标签与读写器之间计算的密钥,从而使泄露攻击成为可能。本文提出了一种保护协议免受这种攻击的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Prevention of Disclosure Attack on a Mutual Authentication Protocol Using RFID Tag in IoT
Security of IoT is a major concern. These devices have simplified various tasks but if the information transmitted through IoT is not authorized and secure, then usage of IoT will be reduced. To solve this problem various algorithms have been proposed. A mutual authentication protocol for IoT devices using RFID tags was previously proposed. The protocol provides ultra-lightweight authentication based on computation power and storage capacity of entities involved. In this protocol, disclosure attack is possible because attacker can obtain the key that is computed between RFID tag and the reader. In this paper a method is proposed to protect the protocol against this attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信