scispace - formally typeset
Journal ArticleDOI

Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs

Reads0
Chats0
TLDR
It is proved that the Caballero-Gil et al. scheme to present a new RFID authentication protocol, entitled CG+, is vulnerable to de-synchronization attack and suffers from the information leakage with a complexity of about 216 offline PRNG evaluations which is completely affordable by a conventional adversary.
Abstract
Due to the storage capacity and computational power restrictions of low-cost RFID tags based on the EPC-C1G2 standard, most of the existing authentication protocols seem too complicated to be appropriate for these tags; thus the design of authentication protocols compliant with the EPC-C1G2 standard is a big challenge. Recently, a lightweight mutual authentication protocol for RFID conforming to the EPC-C1G2 standard was proposed by Caballero-Gil et al. aiming to be used in VANETs. This scheme does not rely on RFID readers as they are portable. Instead, it bases security on trust in the server because all shared secrets are stored only by the tag and the server with no possible access by the reader at any time. In this paper, we prove that this scheme is vulnerable to de-synchronization attack and suffers from the information leakage with a complexity of about 216 offline PRNG evaluations which is completely affordable by a conventional adversary. In addition, we present a simple tag impersonation attack against this protocol. To counteract such flaws, we improve the Caballero-Gil et al. scheme to present a new RFID authentication protocol, entitled CG+, so that it provides the claimed security properties.

read more

Citations
More filters
Journal ArticleDOI

Cybersecurity challenges in vehicular communications

TL;DR: A three-layer framework (sensing, communication and control) through which automotive security threats can be better understood is proposed, which provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures.
Posted Content

Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems.

TL;DR: Security threats and counter measures are discussed for different remote vehicle communication methods namely, remote keyless entry system, dedicated short range communication, cellular scheme, Zigbee, Bluetooth, radio frequency identification, WiFi, WiMAX, and different direct vehicle Communication methods namely on-board diagnosis and universal serial bus.
Journal ArticleDOI

An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection

TL;DR: This protocol has a better performance in terms of storage cost, computation cost and communication cost, and the search efficiency of the background server comparing to the existing relevant research results.
Proceedings ArticleDOI

A secure QoS aware VANET

TL;DR: A Vehicle authentication protocol based generation certification system which uses RFID tags and RFID readers deployed on the roads and vehicles and a QoS aware node attachment and mobility management scheme is proposed.
Journal ArticleDOI

Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol

TL;DR: The forgery attack undermines the protocol in the mutual authentication and the resistance against both the man-in-the-middle attack and the desynchronization as claimed, and the protocol is not suitable for the wireless security systems.
References
More filters
Journal ArticleDOI

SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

TL;DR: A new ultralightweight RFID authentication protocol is proposed that provides strong authentication and strong integrity protection of its transmission and of updated data and can resist all the possible attacks.
Journal ArticleDOI

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards

TL;DR: This paper will point out the weaknesses of two EPC Class 1 GEN-2-conformed security protocols, and then proposes a new protocol, which raises the security level and conforms to the EPC class 1 Gen-2 standards.
Book

RFID: A Guide to Radio Frequency Identification

TL;DR: In this paper, the authors present an overview of RFID technology and its application in supply chain management, law enforcement, and pharmaceutical supply chain, focusing on privacy issues in applying RFID technologies.
Book ChapterDOI

M 2 AP: a minimalist mutual-authentication protocol for low-cost RFID tags

TL;DR: In this paper, the authors proposed a lightweight mutual authentication protocol for low-cost RFID tags that offers an adequate security level for certain applications, which could be implemented even in the most limited lowcost tags as it only needs around 300 gates.
Book ChapterDOI

EMAP: an efficient mutual-authentication protocol for low-cost RFID tags

TL;DR: This work proposes an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.