Attacks and Improvements to an RFID Mutual Authentication Protocol

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, however, the mutual authentication protoco...

全面介紹

Saved in:
書目詳細資料
Main Authors: CAI, Shaoying, LI, Yingjiu, LI, Tieyan, DENG, Robert H.
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2009
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/274
http://dx.doi.org/10.1145/1514274.1514282
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English
實物特徵
總結:In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, however, the mutual authentication protocol is vulnerable to both tag impersonation attack and reader impersonation attack, which enable an adversary to impersonate any legitimate reader or tag. We also discover that the ownership transfer protocol is vulnerable to a de-synchronization attack, which prevents a legitimate reader from authenticating a legitimate tag, and vice versa. We analyze the vulnerabilities of these protocols and propose our revisions to eliminate the vulnerabilities with comparable storage and computational requirements.