Loading…

Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain

Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study the vulnerabilities associated with bitwise operations by doing cryptanalysis...

Full description

Saved in:
Bibliographic Details
Published in:Wireless personal communications 2022, Vol.126 (2), p.1881-1894
Main Authors: Akram, Muhammad Arslan, Mian, Adnan Noor
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study the vulnerabilities associated with bitwise operations by doing cryptanalysis of a secure lightweight authentication protocol for RFID tags. The bitwise operations like rotation and XOR show that the protocol is vulnerable to tag, reader, and supply chain node impersonation attacks. We find that the major cause of the vulnerability is bitwise operations and suggest using the physically unclonable functions rather than bitwise operations to secure such lightweight protocols. We provide formal analysis using AVISPA tool and show that protocol is vulnerable to various attacks.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-022-09826-4