Desynchronization and Traceability Attacks on RIPTA-DA Protocol
Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) Desynchronization and Traceability Attacks on RIPTA-DA Protocol. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 57-68.
Recently Gao et al. proposed a lightweight RFID mutual authentication protocol  to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Book Chapter|
|Keywords:||Systems and Data Security, Data Encryption, e-Commerce/e-business|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2013 Springer-Verlag Berlin Heidelberg|
|Deposited On:||05 Feb 2015 01:07|
|Last Modified:||11 Feb 2016 15:14|
Repository Staff Only: item control page