“…After a set of authentication sessions, the list of pseudonyms will need to be reused or updated through an out-of-band channel, which limits the practicality of this scheme. In addition to this there are other lightweight mutual authentication protocols proposed in the literature [4][5][6]. Attacks have been successfully mounted on all of these as demonstrated in literature [7][8][9].…”
Radio Frequency Identification (RFID) systems are increasingly being deployed in a variety of applications. Widespread deployment of such contactless systems raises many security and privacy concerns due to unauthorized eavesdropping reader, de-synchronization between reader and tag etc. In this paper, we propose a light weight mutual authentication protocol which is an improvement over Li's extended LMAP+ protocol. In mutual authentication, the tag and the reader of the RFID systems will authenticate each other before transmitting unique ID of tag. The proposed protocol provides protection over traceability and de-synchronization attacks.
“…After a set of authentication sessions, the list of pseudonyms will need to be reused or updated through an out-of-band channel, which limits the practicality of this scheme. In addition to this there are other lightweight mutual authentication protocols proposed in the literature [4][5][6]. Attacks have been successfully mounted on all of these as demonstrated in literature [7][8][9].…”
Radio Frequency Identification (RFID) systems are increasingly being deployed in a variety of applications. Widespread deployment of such contactless systems raises many security and privacy concerns due to unauthorized eavesdropping reader, de-synchronization between reader and tag etc. In this paper, we propose a light weight mutual authentication protocol which is an improvement over Li's extended LMAP+ protocol. In mutual authentication, the tag and the reader of the RFID systems will authenticate each other before transmitting unique ID of tag. The proposed protocol provides protection over traceability and de-synchronization attacks.
“…Hence, in whole of this paper we do not distinguish between the reader and the back-end database of FLMAP. To describe the FLMAP, we follow the notations used by the designers of FLMAP [10] which are as follows: and authenticates the tag if y y ′ = .…”
Section: Preliminariesmentioning
confidence: 99%
“…Many mutual authentication protocols are proposed so that tags and readers can securely authenticate each other. So far, several lightweight mutual authentication protocols have been claimed suitable to be employed in RFID applications [3,7,8,10]. However, most of these protocols have failed to achieve the required security goals [1,2,4,5,6,9].…”
Section: Introductionmentioning
confidence: 99%
“…However, most of these protocols have failed to achieve the required security goals [1,2,4,5,6,9]. Sadighian and Jalili have introduced their superior mutual authentication protocol called the Fast Lightweight Mutual Authentication Protocol (FLMAP), where designers claim their protocol guarantees tag anonymity, forward security, and location privacy whilst has resistance against ID disclosure and desynchronization attacks [10]. We, however, put FLMAP under a new rigorous test for a thorough cryptanalysis investigation for surprising results.…”
Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here we examine the security strengths of FLMAP through systematic cryptanalysis tests. Outcome of our investigation show that in spite of its superior speed and power saving features FLMAP shows some serious design gaps and shortfalls against two specifically selected desynchronization and ID disclosure attacks. Finally, we propose solutions to fix the FLMAP designing and security flaws.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.