
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,428 |
Article View | 9,191,220 |
PDF Download | 5,622,137 |
Weaknesses of SPRS Authentication Protocol and Present a Developed Protocol for RFID Systems | ||
پدافند الکترونیکی و سایبری | ||
Article 4, Volume 3, Issue 3, February 2020, Pages 39-48 PDF (1.15 M) | ||
Authors | ||
Mohammad Mardani* 1; Behzad Abdolmaleki2; Karim Bagheri2 | ||
1Assistant Professor, Imam Hossein University, Tehran, Iran | ||
2Master's degree, Faculty of Electrical Engineering, Shahid University, Tehran, Iran | ||
Receive Date: 02 December 2014, Revise Date: 21 June 2023, Accept Date: 19 September 2018 | ||
Abstract | ||
In recent years, cyber security has become one of the main objectives of military organizations. On the other hand, forces identification, authentication and their security have become one of the basic needs of military centers. Although data encryption prevents user access to data contents, an attacker can forges exchanged data by access to communications channels. As a result, providing secure protocols for authentication systems, to prevent different attacks is very important. In this paper, we cryptanalyze a mutual RFID authentication protocol (SPRS) that presented in 2013. Unlike climes of the designers of protocol, we show that their protocol has some weaknesses yet and does not secure against some attacks such as rival secret values, tag impersonation and tractability. Then, an improved version of SPRS protocol is proposed that eliminates SPRS weaknesses. Also, the security and the privacy of proposed protocol are compared with some mutual authentication protocols that proposed recently. | ||
Keywords | ||
RFID Authentication Protocols; Security and Privacy; Attacks; SPRS Protocol | ||
References | ||
[1] E.-C. Australia, “Access control, sensor control, and trans-ponders,” Available on: http://www.rfid.com.au/rfid uhf.htm, 2008. | ||
Statistics Article View: 332 PDF Download: 236 |