Identification of Security Weaknesses on MAP Authentication Protocol and Presentation of Improved Protocol

Authors

Abstract

Nowadays, RFID technology is using widely in our daily lives. This technology is used in many applications such as healthcare, military, identifying friend or foe of fighter-aircraft and etc. In order to provide security and privacy of RFID systems, different authentication protocols have been proposed. Pang proposed a RFID authentication protocol based on EPC C-1 G-2 standard. They claimed that their protocol is secure against various attacks and provides user privacy. It is shown that protocol proposed by pang is not safe and suffer from attacks such as tag ID exposure, tag impersonation, reader impersonation and de-synchronization. Also to enhance security of RFID users, an improved version of this protocol is proposed, showing  that it is secure against aforementioned attacks. In addition, complexity and efficiency of the improved protocol is compared with some similar ones and it is shown that the improved protocol is completely secure. Eventually, security of the improved protocol is compared with some existed protocols.

Keywords