METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL
نویسندگان
چکیده
منابع مشابه
Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol
We analyze a recent RFID lightweight authentication protocol, namely EOHLCAP scheme. Based on our analysis, however, a new traceability attack algorithm makes the scheme insecurity, if the attacker has the ability to distinguish the target tag. Some lightweight authentication protocols are susceptible to the similar traceability attack, so we propose a new traceability attack algorithm. More pr...
متن کاملAn Improved Lightweight RFID Authentication Protocol
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability ...
متن کاملA genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging fr...
متن کاملAn Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
Much research has focused on providing RFID tags with lightweight cryptographic functionality. The HB authentication protocol was recently proposed [1] and claimed to be secure against both passive and active attacks. In this note we propose a linear-time active attack against HB .
متن کاملRFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol
In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Foundations of Computer Science
سال: 2012
ISSN: 0129-0541,1793-6373
DOI: 10.1142/s0129054112400278