• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网供应链系统中置换函数的实用安全分析与攻击策略

Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems.

作者信息

Mokhtari Narges, Safari Amirhossein, Sadeghi Sadegh, Bagheri Nasour, Rostampour Samad, Bendavid Ygal

机构信息

CPS2 Lab, Department of Communication, Faculty of Electrical Engineering, Shahid Rajaee Teacher Training University, Tehran, 16788-15811, Islamic Republic of Iran.

Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, 45137-66731, Iran.

出版信息

Sci Rep. 2025 May 12;15(1):16427. doi: 10.1038/s41598-025-01041-y.

DOI:10.1038/s41598-025-01041-y
PMID:40355448
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12069543/
Abstract

The widespread adoption of IoT devices has made the production of low-cost systems a priority. Since construction costs are generally directly related to the complexity of security methods, researchers are exploring methods that provide acceptable security with minimal hardware complexity. One such method is the use of permutation functions in ultra-lightweight authentication protocols that employ simple operators such as XOR and Shift. This paper demonstrates the critical importance of the internal structure of a permutation function in ensuring system security. This implies that even if a protocol is designed securely and efficiently, structural weaknesses in the function can render the protocol vulnerable. To illustrate this, we examine a recently published protocol named ULBRAP for supply chain management systems and reveal its security flaws, including secret disclosure and traceability attacks. We also demonstrate the attack step-by-step on Raspberry Pi devices, publishing the details on GitHub and presenting them in a video. The attack method requires 1,710,947 hash calculations, which takes approximately 5 min in our experiments. Finally, we propose a solution to address the issues associated with these functions.

摘要

物联网设备的广泛应用使低成本系统的生产成为优先事项。由于建设成本通常与安全方法的复杂性直接相关,研究人员正在探索以最小硬件复杂性提供可接受安全性的方法。其中一种方法是在超轻量级认证协议中使用置换函数,该协议采用异或和移位等简单运算符。本文证明了置换函数的内部结构在确保系统安全方面的至关重要性。这意味着即使一个协议设计得安全且高效,函数中的结构弱点也可能使该协议变得脆弱。为了说明这一点,我们研究了最近发布的用于供应链管理系统的名为ULBRAP的协议,并揭示了其安全漏洞,包括秘密泄露和可追溯性攻击。我们还在树莓派设备上逐步演示了攻击过程,将详细信息发布在GitHub上并制作成视频展示。攻击方法需要1,710,947次哈希计算,在我们的实验中大约需要5分钟。最后,我们提出了一个解决方案来解决与这些函数相关的问题。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/f7ba7ccc16f9/41598_2025_1041_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/1b5f5c782088/41598_2025_1041_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/00b09b87fa0f/41598_2025_1041_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/4498b32d0f6e/41598_2025_1041_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/e1266acd0439/41598_2025_1041_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/d1570ccd0953/41598_2025_1041_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/a6764e8c00fa/41598_2025_1041_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/50f7840c852a/41598_2025_1041_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/f7ba7ccc16f9/41598_2025_1041_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/1b5f5c782088/41598_2025_1041_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/00b09b87fa0f/41598_2025_1041_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/4498b32d0f6e/41598_2025_1041_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/e1266acd0439/41598_2025_1041_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/d1570ccd0953/41598_2025_1041_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/a6764e8c00fa/41598_2025_1041_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/50f7840c852a/41598_2025_1041_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b165/12069543/f7ba7ccc16f9/41598_2025_1041_Fig7_HTML.jpg

相似文献

1
Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems.物联网供应链系统中置换函数的实用安全分析与攻击策略
Sci Rep. 2025 May 12;15(1):16427. doi: 10.1038/s41598-025-01041-y.
2
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.哈希链雾/边缘:一种基于模式的哈希链,用于在雾/边缘中使用零知识证明的安全相互认证协议。
Sensors (Basel). 2022 Jan 13;22(2):607. doi: 10.3390/s22020607.
3
IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function".物联网设备安全:挑战“基于物理不可克隆函数的轻量级 RFID 相互认证协议”。
Sensors (Basel). 2018 Dec 15;18(12):4444. doi: 10.3390/s18124444.
4
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.基于物联网的 RFID 系统安全保障:使用对称密码学的强大身份验证协议。
Sensors (Basel). 2019 Nov 1;19(21):4752. doi: 10.3390/s19214752.
5
Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.面向基于云的物联网环境的可证明安全的轻量级相互认证与密钥协商方案。
Sensors (Basel). 2023 Dec 11;23(24):9766. doi: 10.3390/s23249766.
6
SKINNY-Based RFID Lightweight Authentication Protocol.基于SKINNY的射频识别轻量级认证协议。
Sensors (Basel). 2020 Mar 2;20(5):1366. doi: 10.3390/s20051366.
7
A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems.一种基于哈希的物联网多媒体系统上下文感知管理的射频识别认证机制。
Sensors (Basel). 2019 Sep 4;19(18):3821. doi: 10.3390/s19183821.
8
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity.医疗与制药领域的物联网:设计轻量级射频识别安全协议以确保供应链完整性。
Comput Netw. 2020 Nov 9;181:107558. doi: 10.1016/j.comnet.2020.107558. Epub 2020 Sep 17.
9
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.基于边缘的物联网部署的轻量级设备认证和密钥管理机制(LDAKM-EIoT)
Sensors (Basel). 2019 Dec 14;19(24):5539. doi: 10.3390/s19245539.
10
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.基于区块链的安全认证和密钥协商方案用于 3GPP5G 网络。
Sensors (Basel). 2022 Jun 15;22(12):4525. doi: 10.3390/s22124525.

本文引用的文献

1
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity.医疗与制药领域的物联网:设计轻量级射频识别安全协议以确保供应链完整性。
Comput Netw. 2020 Nov 9;181:107558. doi: 10.1016/j.comnet.2020.107558. Epub 2020 Sep 17.
2
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes.基于物联网的智能家居的安全轻量级认证协议。
Sensors (Basel). 2021 Feb 21;21(4):1488. doi: 10.3390/s21041488.