Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Madiha Khalid
dc.contributor.author Umar Mujahid
dc.contributor.author Muhammad Najam-ul-Islam
dc.date.accessioned 2018-12-05T12:38:54Z
dc.date.available 2018-12-05T12:38:54Z
dc.date.issued 2018
dc.identifier.uri http://hdl.handle.net/123456789/7897
dc.description.abstract Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks. en_US
dc.language.iso en en_US
dc.publisher Bahria University Islamabad Campus en_US
dc.relation.ispartofseries ;DOI: 10.1177/1550147718795120
dc.subject Department of Electrical Engineering DOI: 10.1177/1550147718795120 en_US
dc.title Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account