De-Synchronization attack on the Hash-based mutual authentication protocol

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 665

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CITCONF02_226

تاریخ نمایه سازی: 19 اردیبهشت 1395

چکیده مقاله:

RFID (Radio Frequency Identification) is a tracking technology that normally uses tags to transfer data to a wireless receiver that can connect to computers. However main concern about RFID system is they’re security and privacy. Up to now many protocols are presented for authentication of tags and readers, but most are vulnerable. Hash-based mutual authentication protocol was presented in 2102 by Cho et al. In 2102 Safkhani et al presented that this protocol is vulnerable to De-Synchronization, impression tag and impression reader attacks, and presented a protocol which was resistant to these kinds of attacks. This paper presents that presented protocol by Safkhani et al is also vulnerable to De-Synchronization and DDoS attacks. In this paper we presented an improvement on Safkhani et al’s (2102) protocol which is resistant to de-synchronization and DDoS attacks

نویسندگان

Yaser Azimi

Faculty of Engineering , U rmia University , Urmia, Iran

Akbar Mirzaei

Faculty of Engineering , U rmia University , Urmia, Iran

Mohammad Hadi Fathi

Faculty of Engineering , U rmia University , Urmia, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • PAscAت URIEN, SELwYN PIRAMUTHI (2013), : _ CURVE-BASEB RFID/NFC AUTHEN ...
  • John Ayoade _ Security implications in RFID and authentication processing ...
  • C.M. RoBERTs (2 _ _ RADIO FREQUENCY IDENT TFICATTON (RFID), ...
  • _ CHIEN, CHE-HAO CEN (2 _ 07), ; MUTUAL AUTHENTIC ...
  • SELwYN _ (2 _ _ _ FOR RFID TAG/READER AUTHENTI ...
  • JOHN AYOADE (2007), ، ROADMAP To SOLVING SECURITY AND PRIVACY ...
  • _ CHEN, JE-SAM CoU, _ SUN (2008), : A NOVEL ...
  • L.C. LIN (2009), : AN INTEGRATED FRAMEWORK FOR THE DEVELOPMENT ...
  • ALEx X. LIU, LEROY A. BAILEY (20 09), :PAP: A ...
  • PEpRo PERIS-LOPEz, JULIO C. HERNANDE. CASTRO , JUAN M.E. TAPIADOR, ...
  • JoRGE MUNILLA, ALBERTO PEINADO (2010), ،: ATTACKS ON A DISTANCE ...
  • 1.Bo JN, HONGYU JIN (2 _ 1 _ _ ANALYSIS ...
  • RogN DOSS, W ANLEI _ SARAVANAN SLNDARESAN, SHUI YU, LONGXIANG ...
  • _ QIAN, CE CHEN, ILSN YOU, J UE HONG, SANGLU ...
  • 4.Jung-Sik Cho, Young-Sik Jeong, Sang Oh Park (2012), ، Consideration ...
  • WEI Z1oU, SELWYN _ (2013), : PREvENTNo TICKET- SWITCHING OF ...
  • RogN DOSS, SARAv ANAN SUNDARESAN, WANLEI ZHOf (2013), : A ...
  • Y2-PTN LIAO, CHIH-MING HSIAO (2013), : A SECURE ECC-BAsED RFID ...
  • DENns TRcEk (20 _ LIGHTWEIGH/ PROTOCOLa AND PRIVACY FOR ALL- ...
  • MAsouMEn SAFKIANI, NASOUR BAGHERI, ALI MAHAY (2013), : ON THE ...
  • Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez -Castro , NasourBagheri ...
  • نمایش کامل مراجع