Detailed Information

Cited 4 time in webofscience Cited 5 time in scopus
Metadata Downloads

Questioning the Security of Three Recent Authentication and Key Agreement Protocols

Authors
Rahmani, Amir MasoudMohammadi, MokhtarRashidi, ShimaLansky, JanMildeova, StanislavaSafkhani, MasoumehKumari, SaruHosseinzadeh, Mehdi
Issue Date
Jul-2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
RFID; authentication; IoV-SMAP; EGP protocol; ultra-lightweight; secret disclosure attack; desynchronization attack
Citation
IEEE ACCESS, v.9, pp.98204 - 98217
Journal Title
IEEE ACCESS
Volume
9
Start Page
98204
End Page
98217
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81743
DOI
10.1109/ACCESS.2021.3094875
ISSN
2169-3536
Abstract
Providing the desired security for constrained devices in the edge of Internet of Things (IoT) systems is a challenging task. Given that those devices are in shortage of the area and energy, many lightweight and ultra-lightweight protocols have been proposed so far in the literature. On the other hand, while we see many new proposals in the literature to secure communications on IoT systems, security analysis of those schemes has not received enough attention. Hence, in this paper, we analyse the security of three recently protocols for constrained environments and show their security loopholes. The analysed schemes include two protocols which have been published by IEEE Access and a recently proposed protocol entitled Extremely Good Privacy (EGP). The designers of all those protocols claimed optimal security against active adversaries. However, in this paper, we propose an efficient secret disclosure attack against EGP that recovers the whole secret parameters of the protocol after eavesdropping/blocking several sessions of the protocol and doing some off-line computations. The probability of the adversary to recover whole 2l secret parameters of the tag after eavesdropping/blocking 68 sessions of the protocol is 0.99, targeting a 128-bit security level by l = 128 . In addition, we show that an adversary can efficiently desynchronize the target tag from the reader/server in polynomial time. In the case of the other protocols, we also present efficient attacks that contradict the designers' security claims.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hosseinzadeh, Mehdi photo

Hosseinzadeh, Mehdi
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE