تعداد نشریات | 43 |
تعداد شمارهها | 1,646 |
تعداد مقالات | 13,378 |
تعداد مشاهده مقاله | 30,112,751 |
تعداد دریافت فایل اصل مقاله | 12,061,536 |
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol | ||
Journal of Computing and Security | ||
مقاله 1، دوره 3، شماره 4، دی 2016، صفحه 201-209 اصل مقاله (1.17 M) | ||
نویسندگان | ||
Samad Rostampour1؛ Nasour Bagheri* 2؛ Mehdi Hosseinzadeh2؛ Ahmad Khademzadeh3 | ||
1Department of Computer Engineering, Science and Research branch, Islamic Azad University, Tehran, Iran | ||
2Department of Electrical Engineering, Shahid Rajaee Teachers Training University, Tehran, Iran | ||
3Iran Telecommunication Research Center, Tehran, Iran | ||
چکیده | ||
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the Internet. Authentication process is a method to prevent an unauthorized access to the IoT systems. The using of bit-wise functions such as XOR, Shift and Rotation could decrease the cost of authentication protocols. On the other hand, the simple operations usually could not provide an acceptable security level. Therefore, the researchers try to improve the security level by creating new permutation functions. In this paper, we evaluate some permutation functions and analyze a protocol which recently has been proposed by Huang et al. We prove that their protocol is vulnerable to the disclosure and the impersonation attacks and an adversary can clone a valid tag easily. The complexity of the proposed attack is low and attack method works efficiently for the secret keys and ID numbers with variable length. | ||
کلیدواژهها | ||
Internet of Things؛ RFID؛ Security؛ Authenti cation | ||
آمار تعداد مشاهده مقاله: 509 تعداد دریافت فایل اصل مقاله: 336 |