Author:
Ahmad Khoureich Ka
Affiliation:
Alioune Diop University of Bambey, Senegal
Keyword(s):
RFID, Authentication, LPN, HB+, Man-In-the-Middle.
Related
Ontology
Subjects/Areas/Topics:
Data and Application Security and Privacy
;
Identification, Authentication and Non-Repudiation
;
Information and Systems Security
;
Security and Privacy in Mobile Systems
;
Security and Privacy in Pervasive/Ubiquitous Computing
;
Security Protocols
Abstract:
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-constrained
devices such as RFID tags. The HB+ protocol is based on the Learning Parity with Noise (LPN) problem and
is proven secure against active adversaries. Since a man-in-the-middle attack on HB+ due to Gilbert et al.
was published, many proposals have been made to improve the HB+ protocol. But none of these was formally
proven secure against general man-in-the-middle adversaries. In this paper we present a solution to make the
HB+ protocol resistant to general man-in-the-middle adversaries without exceeding the computational and
storage capabilities of the RFID tag.