Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID
|
|
|
- Susanna McDaniel
- 10 years ago
- Views:
Transcription
1 Journal of Information Hiding and Multimedia Signal Processing c 2014 ISSN Ubiquitous International Volume 5, Number 4, October 2014 Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID Chien-Ming Chen 1,2,a, Shuai-Min Chen 3,b, Xinying Zheng 1,c Lijun Yan 1,d, Huaxiong Wang 4,e, and Hung-Min Sun 3,f 1 Innovative Information Industry Research Center School of Computer Science and Technology Shenzhen Graduate School, Harbin Institute of Technology Shenzhen, , China 2 Shenzhen Key Laboratory of Internet Information Collaboration Shenzhen, , China 3 Department of Computer Science National Tsing Hua University Hisnchu, 30013, Taiwan, R.O.C. 4 Division of Mathematical Sciences School of Physical and Mathematical Sciences Nanyang Technological University Singapore a [email protected], b [email protected], c xinying [email protected], d [email protected], e [email protected], f [email protected] Received October, 2013; revised November, 2013 Abstract. RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure RFID systems with untraceability, which is one of the most critical privacy issues on RFID. In this paper, we demonstrate that their scheme is insecure against two kinds of tracing attacks. We also analyze the success probability of our attacks. Keywords: RFID, Security, Privacy, Error correction code 1. Introduction. RFID (Radio Frequency IDentification) is a technique used to identify objects via radio frequency. It has became very popular in many applications such as access control systems, supply chain management systems, transportation, ticketing systems, animal identification and industrial electronics. Although RFID technology brings people a convenient life, security and privacy issues are still been concerned mostly in RFID applications. As a result, researchers have proposed many RFID protocol to achieve several security requirements. However, with limited computational ability and insufficient memory storage on its embedded chip, lowcost RFID protocol design still remains a challenge. Previous studies showed that the number of logic gates available for security functionality on a low-cost RFID tag is 400 to 4000[1], which is not enough to implement most public key or symmetric key cryptosystems. Therefore, an RFID protocol should be as computationally lightweight as possible. 642
2 Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID 643 In 2009, Chien and Laih[2] proposed an error correction code based RFID protocol to secure RFID systems with mutual authentication, untraceability, anonymity and resistance to denial-of-service attacks. Since the protocol requires only pseudo random number generators and simple bit operations, it is lightweight enough to be implemented on low-cost RFID tags. Unfortunately, we found their scheme is not as secure as they claimed. In this paper, we demonstrate that Chien and Liah s protocol[2] is vulnerable to two kinds of tracing attacks. Our attacks are able to correlate two messages and determine if both of them were generated from the same tag. Hence, with this information, an attacker can trace the tag and eavesdrop on messages. This violates privacy by leaking the tag owner s location. We also analyze the success probability of our attacks. 2. Related Work. With the rapidly growth of network technology, security issues have been concerned in various network environments [3, 4, 5, 6, 7, 8, 9]. In the RFID environment, security and privacy issues also receive increasing attention recently. Lightweight authentication protocols for RFID aim to achieve mutual authentication through simple operations like bitwise XOR and binary addition. In 2005, Juels and Weis proposed a multi-round lightweight authentication protocol called HB + [10], which is an improvement of HumanAut, a human-to-computer authentication protocol designed by Hopper and Blum[11]. Nevertheless, Gilbert and Robshaw proved that the HB + protocol is vulnerable to a man-in-the-middle attack[12]. There are currently many improvements of the HB + protocol. For example, the HB ++ protocol proposed by Bringer et al. in 2006[13], the HB-MP protocol proposed by Munilla and Peinado in 2007[14], and the HB# protocol proposed by Gilbert et al. in 2008[15]. On the other hand, the protocols using only simple bitwise operations on the tags are called ultralightweight protocols. [16, 17]. In 2007, Chien proposed an ultralightweight RFID authentication protocol:[18]. Initially, each tag shares a static identification, a pseudonym and two keys with the server. However, studies[19, 20] showed that SASI is vulnerable to desynchronizing and tracing attacks. In 2012, Tian et al.[21] proposed a new ultra-lightweight RFID protocol named RAPP. RAPP utilize a new bitwise operation called permutation in the protocol. The authors claimed that RAPP can withstand various attacks and provide strong data confidentiality and integrity. Unfortunately, several research have demonstrate that RAPP[22, 23, 24, 25] is vulnerable various kinds of attacks. 3. Reviewing Chien-Laih s Protocol. There are three entities in their protocol, a backend database server S, an RFID reader R, and a set of tags T. It is assumed that the communication channel between the server and the reader is secure, but the wireless communication channel between the reader and the tags is insecure. Each tag is assigned with a unique identity, denoted by T i. Initially, S publishes a random number generator g() and constructs a secret linear code C(n, k, d) over GF (2), which is specified by a generator matrix G. For each tag T i, S assigns s row vectors G[j] into it, where j = (i 1) s + 1,..., i s. Then S stores the corresponding information of each tag in its database, including the tag s identity T i, a secret key k i and the indices of the assigned rows of G. Finally, S writes g(), T i, k i and the corresponding row vectors G[j] into the memory of T i. The detailed steps of Chien-Laih s protocol are listed as follows. 1. R sends a query to T i by a random challenge N R. 2. T i randomly generates a non-zero codeword C i from the pre-assigned row vectors, and randomly chooses an error vector e with Hamming weight t = (d 1)/2. T i then computes the masked codeword C i = C i + e and a verifier message ṼT =
3 644 C.M. Chen, S.M. Chen, X. Zhang, L. Yan, H. Wang and H.M. Sun 1. R T : Send a query to T i by a random number N R 2. T : Randomly generate a non-zero codeword C i from the assigned row vectors. Randomly choose e with Hamming weight t. Compute C i = C i + e and ṼT = g(e g(n R k i )) Choose two random numbers (Ĉi, ˆV T ) that have the same bit length as that of ( C i, ṼT ) 3. R T : Randomly arrange the order of {( C i, ṼT ), (Ĉi, ˆV T )} and send to the reader. 4. R : For each set from {( C i, ṼT ), (Ĉi, ˆV T )}, decode C i to derive (m i, e) Use m i to identify T i and K i IF V T = g(e g(n R k i )) is correct Compute V S = g(n R g(e k i )) ELSE Set V S = random value 5. R T : V S 6. T : Verify if V S = g(n R g(e k i )) or not Figure 1. Chien s ECC-Based Protocol g(e g(n R k i )). After that, T i generates a meaningless random number set (Ĉi, ˆV T ), which has the same bit length as ( C i, ṼT ). Finally, T i randomly determines the order of the two messages {( C i, ṼT ), (Ĉi, ˆV T )}, and sends this message set to R. 3. R decodes both masked codewords of the received message set {( C i, ṼT ), (Ĉi, ˆV T )}. Since only one message from the set is meaningful, R can derive exactly one plaintext m i and error vector e from C i. Then, R uses m i to search the lookup table for the corresponding T i and k i from the database in S. After that, R checks if the condition ṼT = g(e g(n R k i )) holds. If any one of the sets satisfies the condition, R computes a verified message V S = g(n R g(e k i )); otherwise, R sets V S as a random number. Finally, R sends V S to T i. 4. T i authenticates R by checking whether the received V S is equal to g(n R g(e k i )). In Chien-Laih s protocol, each tag can generate 2 s 1 non-zero codewords. Since every tags store distinct row vectors of G, their set of codewords is disjoint. According to the authors claim, an adversary may try to collect all the codewords from a tag and use them to trace the tag. To prevent this happening, a set of random numbers (Ĉi, ˆV T ) is added in each session to confuse the adversary. 4. Crypoanalysis on Chien-Laih s Protocol. The tracing attack means the adversary correlates a previous obtained message with the currently eavesdropped one, and determine whether they are generated from the same tag or not. If these two messages are the same or from the same codeword set, it means the tag nearby right now is the same with the previous known tag. With more readers being placed in different locations, the adversary can continuously trace the movements of tags till it received a specific tag s response. Moreover, because tags are carried by human, the tracing of the tags is equal to trace its possessor. This violates the serious problem of location privacy of users. In this section, a basic version of our tracing attack is proposed. We also provide a variant attack which will be applied to different application scenario. For example, when a tag attached to a book borrowed from a library is traced by an attacker, the privacy of the
4 Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID 645 borrower would be invaded. Another example is that if a thief can trace a tag-attached valuable item stored inside a public locker, then the thief would break the locker and steal that valuable item A Tracing Attack. The goal of our attack is to trace a specific target tag T X without invoking any valid R or S. We first state the fundamental theorem (Theorem 1) used in our attack scenario. Theorem 4.1. For any two codewords C i, C j C(n, k, d), the Hamming weight of (C i + e i ) + (C j + e j ) 2t if C i = C j, where e i and e j are error vectors with each Hamming weight t. Proof. Let Hw() be the Hamming weight function. If C i = C j, Hw((C i +e i )+(C j +e j )) = Hw(e i + e j ) Hw(e i )+ Hw(e j ) 2t. Recall that every two tags always generate distinct codewords since each of them stores distinct row vectors of G, and the number of codewords of a tag is limited to 2 s 1, where Chien and Laih suggest s = 3. In other words, a tag only stores 7 different codewords to use alternatively. Thus, it is likely that a codeword may be used more than once. We apply Theorem 4.1 to determine if these two masked codewords are generated from the same codeword. If the answer is true, we can conclude that these two masked codewords have a higher probability being generated from the same tag, and hence Chien-Laih s scheme fails to defend against the tracing attack. Based on the above idea, our tracing attack is as follows: 1. An adversary A eavesdrops on the communication channel between a valid reader R and its target tag T X. When R reads T X, A records the message set generated by T X during Step 2 of Chien-Laih s protocol as MS X = {( C X,1, V X,1 ), ( C X,2, V X,2 )}. 2. For a time being after eavesdropping on the message, A uses its reader to broadcast queries here and there. Assume A receives a response message set M S = {( C i,1, V i,1 ), ( C i,2, V i,2 )} from a tag T i. 3. A checks if the inequality Hw( C X,j + C i,k ) 2t holds for all j, k = 1, 2. If there exists two messages C X,j and C i,k that satisfies the inequality, the attack process is finished. 4. If there is no such message satisfying the inequality, repeat Step 2 and Step 3. By broadcasting query messages rapidly, the adversary is able to collect the response message sets and determine if the target tag is nearby. If T i is right the one of the target tag T X, the received messages C i,k and C X,j must be generated from the same codeword by Theorem 4.1. The location privacy of the carrier is leaking. This concludes that our tracing attack is successful. On the other hand, the Hamming weight of (C i + e i ) + (C j + e j ) will be less than or equal to 2t even if C i C j under certain situations. Therefore, the attacker may misjudge another tag s response as the target one. This situation will occur whenever the error vectors satisfy some specific patterns. Denote C = C i + C j as a vector whose Hamming weight is not less than d and the vector e = e i + e j whose Hamming weight is t. There will be at least d bits and t bits of 1 s in C and e, respectively. Imagine that when these two vectors are combined together, any overlap on these 1 s will reduce the Hamming weight of C + e = (C i + e i ) + (C j + e j ) by 1, while in any position where the bit values in C and e are distinct, the Hamming weight will increase by 1. Eventually, if there are at least x = t bits overlaps, the Hamming weight of (C i + e i ) + (C j + e j ) will be smaller than or equal to 2t. The probability of this situation can be expressed as
5 646 C.M. Chen, S.M. Chen, X. Zhang, L. Yan, H. Wang and H.M. Sun t i=x (( )( d n d ) i t i ) ( n. Recall that x = t) t 2 + 1, d is the minimum Hamming distace, n is the code word length, and t = (d 1)/2. Briefly, we take the parameter set suggested by Chien and Laih as an example, this situation will occur with the probability , which is relatively small and negligible. In other words, our tracing attack will succeed for a higher probability A Variant Tracing Attack. To reduce failure matching of the target tag, we propose another attack method as follows. Due to the mobility of the carrier, the target tag may be out of the reading range of an attacker s reader. Therefore, another attack scenario is provided. If the attacker finds a still (not moving) tag and decides to trace this tag as target hereafter. Now A continuously queries the tag; therefore, the tag will respond messages every time the attacker queries it. By this method, the attacker is able to collect as many messages as possible. Note that, although the responding message may be repeated according to the protocol, the attacker can query the tag again and again. Assume A by some means had repeated Step 1 of the basic attack and collected more message sets from the target tag T X, denoted by MS X,i, i = 1, 2,.... For the time being, in Step 3, A compares the received message set MS with all message sets in MS X,i, rather than just a single message set MS X. The success probability of this tracing attack is increased with the amount of message sets that A had collected previously. 5. Analysis. Here we analyze the success probability of our attacks. Note that A is with a high probability to determine whether two masked codewords are generated from the same codeword set by applying Theorem 4.1. Therefore, a successful attack mainly depends on the case that a codeword is reused. Our tracing attack will succeed whenever the number of times the adversary repeats Step 2 and Step 3 of our basic attack equals the number of repeated codeword used. Because memory space is limited on low-cost RFID tags and only few row vectors of G can be stored on a single tag; thus, the size of possible codewords set is bounded to a small number. In[2], the authors suggested C(n = 2048, k = 1289, d = 139) and s = 3 as reasonable parameters. That is, a tag can only produce 7 codewords, so the probability of a codeword being reused is high. Therefore, a successful attack just requires repeating Step 2 and Step 3 for a few rounds. For our variant attack, the success probability relies on the number of different codewords collected at Step 1. Here we adopt the formula of inclusion and exclusion. The principle of inclusion and exclusion is to find out the total number that each case appeared at least once. Let N be the number of masked codewords that A has collected from T X, the probability that each codeword has appeared at least once is l i=0 (( 1)i ( l i) (l i) N ) l N, where l = 2 s 1. If s = 3, the success probability will exceed 0.5 when N 17. When N = 40, the probability of success is increased to Notice that A can collect all the information she needs when the target tag is nearby, and once she has acquired all these codewords, she can launch a successful tracing attack by sending a single query to the tag. This variant attack is more appropriate in most RFID applications. On the other hand, the Hamming weight of (C i +e i )+(C j +e j ) will be less than or equal to 2t even if C i C j. Therefore, the attacker may mistake another tag s response as the targeted one. This situation occurs whenever the error vectors satisfy specific patterns. Denote vector C = C i + C j whose Hamming weight is not less than d and the vector e = e i + e j whose Hamming weight is t. There will be at least d bits and t bits of 1 s
6 Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID 647 in C and e, respectively. Imagine when these two vectors are combined together, any overlap on these 1 s will reduce the Hamming weight of C + e = (C i + e i ) + (C j + e j ) by 1, while in any position where the bit values in C and e are distinct, the Hamming weight will increase by 1. Eventually, if there are at least x = t + 1 bits overlaps, the 2 Hamming weight of (C i + e i ) + (C j + e j ) will be less than or equal to 2t. The probability t i=x of this situation can be express as (( )( d n d ) i t i ) ( n. Taking the parameter set suggested t) by Chien as an example, the probability is , which is a relatively small value. Furthermore, since ṼT is generated from hash function, there exists a small probability that the value decoded from the meaningless random message just matches with the valid codeword set. In this case, our tracing attack seems to have failed since the adversary recognizes another tag s message as her target one. However, this situation will occur only with the probability (2s 1) ( ) n t, which is negligible when a larger n is chosen. 2 n Taking Chien-Laih s parameter set as the example again, the probability is This is undoubtedly a negligible value. 6. Conclusions. Security and privacy issues on RFID have been studied in recent years due to the rapid growth of RFID systems. In this paper, we show that Chien and Liah s protocol is vulnerable to two kinds of tracing attacks. The goal of tracing attack is to discover the presence of a specific tag. According to our analysis, our tracing attack will succeed for a higher probability. Acknowledgement. The work of C.-M. Chen was supported in part by the Shenzhen Peacock Project, China, under Contract KQC A, and in part by Shenzhen Strategic Emerging Industries Program under Grant ZDSY The work of H.-M. Sun was supported in part by the National Science Council, Taiwan, R.O.C., under Grant NSC E MY3. The corresponding author is Prof. Hung- Min Sun. REFERENCES [1] D. Ranasinghe, D. Engels, and P. Cole, Low-Cost RFID systems: confronting security and privacy, Auto-ID Labs Research Workshop, pp , [2] H.-Y. Chien and C.-S. Laih, ECC-based lightweight authentication protocol with untraceability for Low-Cost RFID, Journal of Parallel and Distributed Computing, vol. 69, no. 10, pp , [3] T.-Y. Wu and Y.-M. Tseng, Further analysis of pairing-based traitor tracing schemes for broadcast encryption, Security and Communication Networks, vol. 6, no. 1, pp , [4] C.-M. Chen, K.-H. Wang, T.-Y. Wu, J.-S. Pan, and H.-M. Sun, A scalable transitive humanverifiable authentication protocol for mobile devices, IEEE Trans. Information Forensics and Security, vol. 8, no. 8, pp , [5] T.-Y. Wu and Y.-M. Tseng, Publicly verifiable multi-secret sharing scheme from bilinear pairings, IET Information Security, vol. 7, no. 3, pp , [6] T.-P. Hong, C.-W. Lin, K.-T. Yang, and S.-L.Wang, Using tf-idf to hide sensitive itemsets, Applied Intelligence, pp. 1-9, [7] C.-M. Chen, Y.-H. Chen, Y.-H. Lin, and H.-M. Sun, Eliminating rouge femtocells based on distance bounding protocol and geographic information, Expert Systems with Applications, vol. 41, no. 2, pp , [8] H.-M. Sun, H. Wang, K.-H. Wang, and C.-M. Chen, A native apisprotection mechanism in the kernel mode against malicious code, IEEE Trans. Computers, vol. 60, no. 6, pp , [9] C.-M. Chen, Y.-H. Lin, Y.-C. Lin, and H.-M. Sun, Rcda: recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 4, pp , 2012.
7 648 C.M. Chen, S.M. Chen, X. Zhang, L. Yan, H. Wang and H.M. Sun [10] A. Juels and S. Weis, Authenticating pervasive devices with human protocols, Advances in Cryptology-CRYPTO 2005, vol. 3621, pp , [11] N. Hopper and M. Blum, Secure human identification protocols, Proc. of the 7th International Conference on Theory and Application of Cryptology and Information Security, pp , [12] H. Gilbert, M. Robshaw, and H. Sibert, Active attack against HB + : a provably secure lightweight authentication protocol IEEE Electronics Letters, vol. 41, no. 21, pp , [13] J. Bringer, H. Chabanne, E. Dottax, and S. Securite, HB ++ : a lightweight authentication protocol secure against some attacks, Proc. of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp , [14] J. Munilla and A. Peinado, HB-MP: a further step in the HB-Family of lightweight authentication protocols, Computer Networks, vol. 51, no. 9, pp , [15] H. Gilbert, M. Robshaw, and Y. Seurin, HB#: Increasing the Security and Efficiency of HB+, Proc. of the 27th International Conference on Theory and Applications of Cryptographic Techniques, pp , [16] T. Li and R. Deng, Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol, Proc. of the 2nd International Conference on Availability, Reliability and Security, pp , [17] T. Li and G. Wang, Security analysis of two Ultra-Lightweight RFID authentication protocols, Proc. of the IFIP TC-11 22nd International Information Security Conference, vol. 232, pp , [18] H.-Y. Chien, SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity, IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 4, pp , [19] H.-M. Sun, W.-C. Ting, and K.-H. Wang, On the security of Chiens ultralightweight RFID authentication protocol, IEEE Trans. on Dependable and Secure Computing, vol. 8, no. 2, pp , [20] R.-W. Phan, Cryptanalysis of a new ultralightweight RFID authentication protocol-sasi, IEEE Trans. on Dependable and Secure Computing, vol. 6, no. 4, pp , [21] Y. Tian, G. Chen, and J. Li, A new ultralightweight rfid authentication protocol with permutation, IEEE Communications Letters, vol. 16, no. 5, pp , [22] G. Avoine and X. Carpent, Yet another ultralightweight authentication protocol that is broken, Radio Frequency Identication. Security and Privacy Issues, Springer,Berlin-Heidelberg, Germany, pp , [23] W. Shao-hui, H. Zhijie, L. Sujuan, and C. Dan-wei, Security analysis of rapp an rfid authentication protocol based on permutation, Cryptology eprint Archive, Report 2012/327, Technology Report, [24] Z. Ahmadian, M. Salmasizadeh, and M. R. Aref, Desynchronization attack on rapp ultralightweight authentication protocol, Information processing letters, vol. 113, no. 7, pp , [25] X. Zhuang, Z.-H. Wang, C.-C. Chang, and Y. Zhu, Security analysis of a new ultra-lightweight rfidprotocol and its improvement, Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 3, 2013.
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
On the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
Scalable RFID Security Protocols supporting Tag Ownership Transfer
Scalable RFID Security Protocols supporting Tag Ownership Transfer Boyeon Song a,1, Chris J. Mitchell a,1 a Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Security Requirements for RFID Computing Systems
International Journal of Network Security, Vol.6, No.2, PP.214 226, Mar. 2008 214 Security Requirements for RFID Computing Systems Xiaolan Zhang 1 and Brian King 2 (Corresponding author: Xiaolan Zhang)
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Ehsan Vahedi, Rabab K. Ward and Ian F. Blake Department of Electrical and Computer Engineering The University of British
Back-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Research Article Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
International Journal of Distributed Sensor Networks Article ID 937198 Research Article Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud Qingkuan Dong, Jiaqing
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong
Secure and Serverless RFID Authentication and Search Protocols
Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li {cct,shengbo,liqun}@cs.wm.edu Department of Computer Science College of William and Mary Abstract With the
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
Group Testing a tool of protecting Network Security
Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N
Efficient Nonce-based Authentication Scheme for. session initiation protocol
International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department
Secure Anonymous RFID Authentication Protocols
Secure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences Florida A & M University Tallahassee, Florida 32307-5100 [email protected] Tri van Le and Mike Burmester
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010
International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 5(A), May 2011 pp. 2257 2267 A SMART CARD-BASED MOBILE SECURE TRANSACTION
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
Third 2008 International Conference on Convergence and Hybrid Information Technology A Survey of RFID Authentication Protocols Based on Hash-Chain Method Irfan Syamsuddin a, Tharam Dillon b, Elizabeth
Tackling Security and Privacy Issues in Radio Frequency Identification Devices
Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.
Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China
Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection
Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection YUNG-CHIN CHEN 1,*, WEI-LIN WANG 1, AND MIN-SHIANG HWANG 2 1 Department of Computer and Communication Engineering, Asia
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
Data Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Various Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
50 ways to break RFID privacy
50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg [email protected] 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
Design for Management Information System Based on Internet of Things
Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, [email protected] Abstract
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Lightweight Cryptography From an Engineers Perspective
Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware
