Journal ArticleDOI
Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
Da-Zhi Sun,Yi Mu +1 more
TLDR
The security analysis of GUPA will be beneficial to the design of the robust grouping-proof authentication protocols in the future and suggest employing the cryptographic hash function to protect the secrets in GUPA.Abstract:
Liu et al. proposed a grouping-proof authentication protocol (GUPA) for distributed radio frequency identification systems. At the same time, Liu et al. claimed that GUPA can resist the well-known attacks such as replay, forgery, tracking, and denial of proof. However, we report that, according to Liu et al. ’s assumption of the attack ability, the attacker is able to compromise all secrets by the man-in-the-middle (MIM) attacks. Although the MIM attacks were not explicitly evaluated by GUPA, the attacker can easily launch replay, forgery, tracking, and denial of proof when he knows all secrets of GUPA. That is, the lethal security flaws exist in GUPA. We also suggest employing the cryptographic hash function to protect the secrets in GUPA. Our security analysis of GUPA will be beneficial to the design of the robust grouping-proof authentication protocols in the future.read more
Citations
More filters
Posted Content
Provably Secure Grouping-proofs for RFID tags.
TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns
Anjia Yang,Dutliff Boshoff,Qiao Hu,Gerhard P. Hancke,Xizhao Luo,Jian Weng,Keith Mayes,Konstantinos Markantonakis +7 more
TL;DR: A novel efficient group authentication protocol is put forward, where a group of tags can be authenticated simultaneously with only one challenge and one response, built on a newly designed symmetric key-based algorithm and the bit-collision pattern technique.
Journal ArticleDOI
A Secure and Efficient Parallel-Dependency RFID Grouping-Proof Protocol
Vanya Cherneva,Jerry L. Trahan +1 more
TL;DR: A light, improved offline protocol: parallel-dependency grouping-proof protocol (PDGPP), which tackles the challenges of including robust privacy mechanisms and accommodates missing tags, is proposed and complies with EPC C1G2.
Distributed Wireless Algorithms for RFID Systems: Grouping Proofs and Cardinality Estimation
TL;DR: This document summarizes current capabilities, research and operational priorities, and plans for further studies that were established at the 2015 USGS workshop on quantitative hazard assessments of earthquake-triggered landsliding and liquefaction in the Czech Republic.
Journal ArticleDOI
A RFID-Integrated Framework for Tag Anti-Collision in UAV-Aided VANETs
TL;DR: In this paper, a tag grouping method based on adaptive power control was proposed to make the reader dynamically match the optimal frame length to improve the tag detection accuracy and reduce the collision probability.
References
More filters
Proceedings ArticleDOI
"Yoking-proofs" for RFID tags
TL;DR: This work proposes the concept of a yoking-proof, namely a proof that a pair of RFID tags has been scanned simultaneously, and suggests that such proofs are a useful tool for maintaining integrity in supply chains, particularly as RFID data will commonly flow across multiple, loosely affiliated organizations.
Journal ArticleDOI
Classifying RFID attacks and defenses
TL;DR: The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding ofRFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
Proceedings ArticleDOI
On Existence Proofs for Multiple RFID Tags
TL;DR: This work considers the case where two or more RFID tags need to be simultaneously scanned and proposes a modified proof that is not immune to `replay attack.
Posted Content
Provably Secure Grouping-proofs for RFID tags.
TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI
A Framework for Assessing RFID System Security and Privacy Risks
TL;DR: This framework for evaluating security and privacy risks in RFID systems focuses on key application domains, assessing risk levels for each on the basis of RFID-specific criteria.