An Improved Lightweight RFID Authentication Protocol
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, thereby significantly strengthening the security of the protocol without introducing extra resource cost.
Year of publication: |
2011
|
---|---|
Authors: | Zhang, Xiaowen ; Zhang, Zhanyang ; Wei, Xinzhou |
Published in: |
International Journal of Applied Logistics (IJAL). - IGI Global, ISSN 1947-9573. - Vol. 2.2011, 1, p. 76-84
|
Publisher: |
IGI Global |
Saved in:
Saved in favorites
Similar items by person
-
Predictive modeling of a radiative shock system
Holloway, James Paul, (2011)
-
Valuation of spread options under correlated skew Brownian motions
Song, Shiyu, (2024)
-
Ma, Liang, (2023)
- More ...