Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol
نویسندگان
چکیده
Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here we examine the security strengths of FLMAP through systematic cryptanalysis tests. Outcome of our investigation show that in spite of its superior speed and power saving features FLMAP shows some serious design gaps and shortfalls against two specifically selected desynchronization and ID disclosure attacks. Finally, we propose solutions to fix the FLMAP designing and security flaws. Keywords-Security Test, RFID, FLMAP, Desynchronization, ID Disclosure, Cryptanalysis
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملCryptanalysis of a Lightweight RFID Authentication Protocol - LRMAP
In this paper, we present an efficient attack against the traceability of the LRMAP, a recently proposed lightweight RFID mutual authentication protocol. The attack benefits from the variance in elapsed time of the reader responses corresponding to the different tag states. We show that LRMAP does not provide untraceability, which is one of its design objectives.
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملUltra-Lightweight Cryptography for Low-Cost RFID Tags: Hummingbird Algorithm and Protocol
Motivated by the design of the well-known Enigma machine, we present a novel ultra-lightweight encryption scheme, referred to as Hummingbird, and its applications to a privacy-preserving identification and mutual authentication protocol for RFID applications. Hummingbird can provide the designed security with a small block size and is therefore expected to meet the stringent response time and p...
متن کامل