2018
DOI: 10.3390/fi10090082
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems

Abstract: Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 29 publications
(66 reference statements)
0
1
0
Order By: Relevance
“…Although the designers of KSP and SOVNOKP argued its security formally using GNY logic, however, it is easy to show that they are as vulnerable to different attacks as their predecessor rotation based protocols, e.g. see [19].…”
Section: Security Analysis Of Ksp and Sovnokpmentioning
confidence: 99%
“…Although the designers of KSP and SOVNOKP argued its security formally using GNY logic, however, it is easy to show that they are as vulnerable to different attacks as their predecessor rotation based protocols, e.g. see [19].…”
Section: Security Analysis Of Ksp and Sovnokpmentioning
confidence: 99%