On the Security of Two Ownership Transfer Protocols and Their Improvements
Journal: The International Arab Journal of Information Technology (Vol.15, No. 1)Publication Date: 2018-01-01
Authors : Nasour Bagheri Farhad Aghili Masoumeh Safkhani;
Page : 87-93
Keywords : RFID; cryptanalysis; ownership transfer protocol; de-synchronization attack.;
Abstract
In recent years, Radio Frequency Identification (RFID) systems are widely used in many applications. In some applications, the ownership of an RFID tag might change. To provide a solution, researchers have proposed several ownership transfer protocols based on encryption functions for RFID-tagged objects. In this paper, we consider the security of Kapoor and Piramuthu [3] ownership transfer protocol and Kapoor et al. [4] ownership transfer protocol. More precisely, we present de-synchronization attacks against these protocols. The success probability of all attacks is 1 while the complexity is only two runs of protocol. Finally, we present our suggestions to improve the security of these protocols.
Other Latest Articles
- Consensus-Based Combining Method for Classifier Ensembles
- Missing Values Estimation for Skylines in Incomplete Database
- Tunisian Dialect Recognition Based on Hybrid Techniques
- Financial Time Series Forecasting Using Hybrid Wavelet-Neural Model
- Efficient Parameterized Matching Using BurrowsWheeler Transform
Last modified: 2019-04-29 19:01:12