| Literature DB >> 30558323 |
Ygal Bendavid1, Nasour Bagheri2,3, Masoumeh Safkhani4, Samad Rostampour5,6.
Abstract
With the exponential increase of Internet of things (IoT) connected devices, important security risks are raised as any device could be used as an attack channel. This preoccupation is particularly important with devices featuring limited processing power and memory capabilities for security purposes. In line with this idea, Xu et al. (2018) proposed a lightweight Radio Frequency Identification (RFID) mutual authentication protocol based on Physical Unclonable Function (PUF)-ensuring mutual tag-reader verification and preventing clone attacks. While Xu et al. claim that their security protocol is efficient to protect RFID systems, we found it still vulnerable to a desynchronization attack and to a secret disclosure attack. Hence, guidelines for the improvements to the protocol are also suggested, for instance by changing the structure of the messages to avoid trivial attacks. In addition, we provide an explicit protocol for which our formal and informal security analysis have found no weaknesses.Entities:
Keywords: IoT; RFID; authentication protocol; desynchronization attack; physical unclonable function; security
Year: 2018 PMID: 30558323 PMCID: PMC6308613 DOI: 10.3390/s18124444
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1IoT reference model ([16]).
Figure 2Time sequence diagram of Xu et al.’s protocol for single tag authentication.
The notations used in the Xu et al.’s protocol.
| Notations | |
|---|---|
|
| Fake tag ID |
|
| Physical Unclonable Function |
|
| The tag’s ID number |
|
| Pseudo ID of the tag |
|
| The tag’s secret value |
|
| The shared secret value of the tag and the reader |
| ⋘ | The left rotation operator |
| & | The AND operator |
|
| The concatenation operator |
|
| A random number |
| ⊕ | XOR function |
|
| Denotes the |
Figure 3The improved PUF-based protocol.
The proposed protocol verification results using the Scyther tool.
| Claim | Status | Comments | |||
|---|---|---|---|---|---|
| improved | R | improved,R1 | Secret ID | OK | No attacks within bounds. |
| improved,R2 | Niagree | OK | No attacks within bounds. | ||
| improved,R3 | Nisynch | OK | No attacks within bounds. | ||
| improved,R4 | Alive | OK | No attacks within bounds. | ||
| improved,R5 | Weakagree | OK | No attacks within bounds. | ||
| T | improved,T1 | Secret PIDi | OK | No attacks within bounds. | |
| improved,T2 | Secret PIDip1 | OK | No attacks within bounds. | ||
| improved,T3 | Niagree | OK | No attacks within bounds. | ||
| improved,T4 | Nisynch | OK | No attacks within bounds. | ||
| improved,T5 | Alive | OK | No attacks within bounds. | ||
| improved,T6 | Weakagree | OK | No attacks within bounds. |
The security comparison of the improved protocol to other protocols against IoT attacks.
| Protocols | Impersonation | Traceability | Disclosure | Desynchronization |
|---|---|---|---|---|
| Sadeghi et al. [ | × | × | ✓ | ✓ |
| Aysu et al. [ | ✓ | × | × | ✓ |
| Van Herrewege et al. [ | ✓ | ✓ | × | ✓ |
| Kulseng et al. [ | ✓ | ✓ | × | × |
| Xu et al. [ | ✓ | ✓ | × | × |
| Improved Protocol | ✓ | ✓ | ✓ | ✓ |
✓: Resistant ×: Non-resistant.