METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol

We analyze a recent RFID lightweight authentication protocol, namely EOHLCAP scheme. Based on our analysis, however, a new traceability attack algorithm makes the scheme insecurity, if the attacker has the ability to distinguish the target tag. Some lightweight authentication protocols are susceptible to the similar traceability attack, so we propose a new traceability attack algorithm. More pr...

متن کامل

An Improved Lightweight RFID Authentication Protocol

This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability ...

متن کامل

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol

Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging fr...

متن کامل

An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol

Much research has focused on providing RFID tags with lightweight cryptographic functionality. The HB authentication protocol was recently proposed [1] and claimed to be secure against both passive and active attacks. In this note we propose a linear-time active attack against HB .

متن کامل

RFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol

In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Foundations of Computer Science

سال: 2012

ISSN: 0129-0541,1793-6373

DOI: 10.1142/s0129054112400278