Cryptanalysis of a Scalable Grouping-proof Protocol for RFID Tags
نویسندگان
چکیده
The design of secure grouping-proof protocol is imperative to the pervasive deployment of low-cost RFIDs, though many protocols have been published recently. In this paper, we analyze the security vulnerabilities of a scalable grouping-proof protocol for RFID tags based on Shamir’s (n, n) secret sharing proposed by Dang and Kwangjo in 2009. This protocol attempts to alleviate many security weaknesses and improve scalability of previous grouping-proof protocols. However, notwithstanding their theoretical analysis of security and performance, we find out that D-K protocol is vulnerable to malicious attacks, such as man-in-the-middle (MITM) attack, counterfeit attack and untraceability attack and meanwhile fails to provide data confidentiality and tag anonymity. Moreover we point out the design flaws of this protocol which need to be avoided in designing new grouping-proof protocol.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملGrouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
In this paper, we propose a grouping-proof protocol for RFID tags based on secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud atttack. Mafia fra...
متن کاملScalable Grouping-proof Protocol for RFID Tags
In this paper, we propose a grouping-proof protocol for RFID tags based on (n, n)-secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud attack (som...
متن کاملCryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags
Ownership transfer and grouping proof protocols are the two most important requirements for RFID tag in various applications such as pharmaceutical distribution and manufacturing. In 2010, Zuo integrated these two requirements and introduced a protocol for RFID tag group ownership transfer (GOT), i.e., transferring the ownership of a group of tags in one session. However, this paper shows that ...
متن کاملAn Anonymous Offline RFID Grouping-Proof Protocol
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and to generate reliable grouping-pro...
متن کامل