Vulnerability Analysis of Two Ultra-lightweight RFID Authentication Protocols: RAPP and Gossamer
Abstract
The available energy and computational resources needed for privacy and authentication in RFID systems are limited. in recent years, a new track of research investigated the feasibility of using ultra-lightweight protocols that are based on simple operations to provide the required privacy and mutual authentication functionality while meeting the stringent constraints. Several ideas were proposed and evaluated in an informal way by stating the message exchanges without considering the validity of the assumptions nor the correctness of the messages exchanged. Subsequent research efforts showed that most of these protocols were vulnerable to one attack or more. in this paper, we consider two ultra-lightweight mutual authentication protocols that were shown to be vulnerable to the full disclosure and de-synchronization attacks; respectively. the protocols are formally analyzed using GNY logic to explain the incorrect assumptions of the protocols, how these assumption were exploited, and how they could have been avoided. © 2012 Infonomics Society.
Recommended Citation
E. Taqieddin and J. Sarangapani, "Vulnerability Analysis of Two Ultra-lightweight RFID Authentication Protocols: RAPP and Gossamer," 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012, pp. 80 - 86, article no. 6470989, Institute of Electrical and Electronics Engineers, Dec 2012.
Department(s)
Electrical and Computer Engineering
Second Department
Computer Science
Keywords and Phrases
authentication; GNY analysis; permutation; privacy; RFID; substitution; ultra-lightweight
International Standard Book Number (ISBN)
978-190832008-7
Document Type
Article - Conference proceedings
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2024 Institute of Electrical and Electronics Engineers, All rights reserved.
Publication Date
01 Dec 2012