{"title":"物联网中RFID标签互鉴协议的披露攻击防范","authors":"Hadeeqa Nasir, Nazish Kanwal, Musfirah","doi":"10.1109/ICAEM.2018.8536304","DOIUrl":null,"url":null,"abstract":"Security of IoT is a major concern. These devices have simplified various tasks but if the information transmitted through IoT is not authorized and secure, then usage of IoT will be reduced. To solve this problem various algorithms have been proposed. A mutual authentication protocol for IoT devices using RFID tags was previously proposed. The protocol provides ultra-lightweight authentication based on computation power and storage capacity of entities involved. In this protocol, disclosure attack is possible because attacker can obtain the key that is computed between RFID tag and the reader. In this paper a method is proposed to protect the protocol against this attack.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"76 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Prevention of Disclosure Attack on a Mutual Authentication Protocol Using RFID Tag in IoT\",\"authors\":\"Hadeeqa Nasir, Nazish Kanwal, Musfirah\",\"doi\":\"10.1109/ICAEM.2018.8536304\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of IoT is a major concern. These devices have simplified various tasks but if the information transmitted through IoT is not authorized and secure, then usage of IoT will be reduced. To solve this problem various algorithms have been proposed. A mutual authentication protocol for IoT devices using RFID tags was previously proposed. The protocol provides ultra-lightweight authentication based on computation power and storage capacity of entities involved. In this protocol, disclosure attack is possible because attacker can obtain the key that is computed between RFID tag and the reader. In this paper a method is proposed to protect the protocol against this attack.\",\"PeriodicalId\":427270,\"journal\":{\"name\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"volume\":\"76 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAEM.2018.8536304\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEM.2018.8536304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Prevention of Disclosure Attack on a Mutual Authentication Protocol Using RFID Tag in IoT
Security of IoT is a major concern. These devices have simplified various tasks but if the information transmitted through IoT is not authorized and secure, then usage of IoT will be reduced. To solve this problem various algorithms have been proposed. A mutual authentication protocol for IoT devices using RFID tags was previously proposed. The protocol provides ultra-lightweight authentication based on computation power and storage capacity of entities involved. In this protocol, disclosure attack is possible because attacker can obtain the key that is computed between RFID tag and the reader. In this paper a method is proposed to protect the protocol against this attack.