scispace - formally typeset
Journal ArticleDOI

Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems

Da-Zhi Sun, +1 more
- 01 Apr 2018 - 
- Vol. 7, Iss: 2, pp 254-257
TLDR
The security analysis of GUPA will be beneficial to the design of the robust grouping-proof authentication protocols in the future and suggest employing the cryptographic hash function to protect the secrets in GUPA.
Abstract
Liu et al. proposed a grouping-proof authentication protocol (GUPA) for distributed radio frequency identification systems. At the same time, Liu et al. claimed that GUPA can resist the well-known attacks such as replay, forgery, tracking, and denial of proof. However, we report that, according to Liu et al. ’s assumption of the attack ability, the attacker is able to compromise all secrets by the man-in-the-middle (MIM) attacks. Although the MIM attacks were not explicitly evaluated by GUPA, the attacker can easily launch replay, forgery, tracking, and denial of proof when he knows all secrets of GUPA. That is, the lethal security flaws exist in GUPA. We also suggest employing the cryptographic hash function to protect the secrets in GUPA. Our security analysis of GUPA will be beneficial to the design of the robust grouping-proof authentication protocols in the future.

read more

Citations
More filters
Posted Content

Provably Secure Grouping-proofs for RFID tags.

TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

TL;DR: A novel efficient group authentication protocol is put forward, where a group of tags can be authenticated simultaneously with only one challenge and one response, built on a newly designed symmetric key-based algorithm and the bit-collision pattern technique.
Journal ArticleDOI

A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol

TL;DR: A light, improved offline protocol: parallel-dependency grouping-proof protocol (PDGPP), which tackles the challenges of including robust privacy mechanisms and accommodates missing tags, is proposed and complies with EPC C1G2.

Distributed Wireless Algorithms for RFID Systems: Grouping Proofs and Cardinality Estimation

TL;DR: This document summarizes current capabilities, research and operational priorities, and plans for further studies that were established at the 2015 USGS workshop on quantitative hazard assessments of earthquake-triggered landsliding and liquefaction in the Czech Republic.
Journal ArticleDOI

A RFID-Integrated Framework for Tag Anti-Collision in UAV-Aided VANETs

TL;DR: In this paper, a tag grouping method based on adaptive power control was proposed to make the reader dynamically match the optimal frame length to improve the tag detection accuracy and reduce the collision probability.
References
More filters
Proceedings ArticleDOI

"Yoking-proofs" for RFID tags

Ari Juels
TL;DR: This work proposes the concept of a yoking-proof, namely a proof that a pair of RFID tags has been scanned simultaneously, and suggests that such proofs are a useful tool for maintaining integrity in supply chains, particularly as RFID data will commonly flow across multiple, loosely affiliated organizations.
Journal ArticleDOI

Classifying RFID attacks and defenses

TL;DR: The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding ofRFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
Proceedings ArticleDOI

On Existence Proofs for Multiple RFID Tags

TL;DR: This work considers the case where two or more RFID tags need to be simultaneously scanned and proposes a modified proof that is not immune to `replay attack.
Posted Content

Provably Secure Grouping-proofs for RFID tags.

TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI

A Framework for Assessing RFID System Security and Privacy Risks

TL;DR: This framework for evaluating security and privacy risks in RFID systems focuses on key application domains, assessing risk levels for each on the basis of RFID-specific criteria.
Related Papers (5)