Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT

07/25/2019
by   Masoumeh Safkhani, et al.
0

By expanding the connection of objects to the Internet and their entry to human life, the issue of security and privacy has become important. In order to enhance security and privacy on the Internet, many security protocols have been developed. Unfortunately, the security analyzes that have been carried out on these protocols show that they are vulnerable to one or few attacks, which eliminates the use of these protocols. Therefore, the need for a security protocol on the Internet of Things (IoT) has not yet been resolved. Recently, Khor and Sidorov cryptanalyzed the Wang et al. protocol and presented an improved version of it. In this paper, at first, we show that this protocol also does not have sufficient security and so it is not recommended to be used in any application. More precisely, we present a full secret disclosure attack against this protocol, which extracted the whole secrets of the protocol by two communication with the target tag. In addition, Sidorv et al. recently proposed an ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains, supported by formal and informal security proofs. However, we present a full secret disclosure attack against this protocol as well.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/07/2020

Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States

Recently, Yan et al. proposed a quantum secure direct communication (QSD...
research
10/19/2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

Radio Frequency Identification (RFID) is a key technology used in many a...
research
04/15/2021

Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case

Today, the Internet of Things (IoT) is one of the emerging technologies ...
research
05/27/2019

Cryptanalysis of the SLAP Authentication Protocol

RFID (Radio Frequency Identification) is a powerful technology that, due...
research
03/21/2022

On Rangasamy's outsourcing algorithm for solving quadratic congruence equations

Outsourcing computation is a desired approach for IoT (Internet of Thing...
research
10/27/2020

Multi-factor Physical Layer Security Authentication in Short Blocklength Communication

Lightweight and low latency security mechanisms are becoming increasingl...
research
11/15/2018

It Does Not Follow. Response to "Yes They Can! ..."

This a response to "Yes They Can! ..." (a comment on [5]) by J.S. Shaari...

Please sign up or login with your details

Forgot password? Click here to reset