Questioning the Security of Three Recent Authentication and Key Agreement Protocols
- Authors
- Rahmani, Amir Masoud; Mohammadi, Mokhtar; Rashidi, Shima; Lansky, Jan; Mildeova, Stanislava; Safkhani, Masoumeh; Kumari, Saru; Hosseinzadeh, Mehdi
- Issue Date
- Jul-2021
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- RFID; authentication; IoV-SMAP; EGP protocol; ultra-lightweight; secret disclosure attack; desynchronization attack
- Citation
- IEEE ACCESS, v.9, pp.98204 - 98217
- Journal Title
- IEEE ACCESS
- Volume
- 9
- Start Page
- 98204
- End Page
- 98217
- URI
- https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81743
- DOI
- 10.1109/ACCESS.2021.3094875
- ISSN
- 2169-3536
- Abstract
- Providing the desired security for constrained devices in the edge of Internet of Things (IoT) systems is a challenging task. Given that those devices are in shortage of the area and energy, many lightweight and ultra-lightweight protocols have been proposed so far in the literature. On the other hand, while we see many new proposals in the literature to secure communications on IoT systems, security analysis of those schemes has not received enough attention. Hence, in this paper, we analyse the security of three recently protocols for constrained environments and show their security loopholes. The analysed schemes include two protocols which have been published by IEEE Access and a recently proposed protocol entitled Extremely Good Privacy (EGP). The designers of all those protocols claimed optimal security against active adversaries. However, in this paper, we propose an efficient secret disclosure attack against EGP that recovers the whole secret parameters of the protocol after eavesdropping/blocking several sessions of the protocol and doing some off-line computations. The probability of the adversary to recover whole 2l secret parameters of the tag after eavesdropping/blocking 68 sessions of the protocol is 0.99, targeting a 128-bit security level by l = 128 . In addition, we show that an adversary can efficiently desynchronize the target tag from the reader/server in polynomial time. In the case of the other protocols, we also present efficient attacks that contradict the designers' security claims.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - ETC > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.