The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol

It is very challenging on designing cryptographically strong security functions that can be incorporated into lowcost radio frequency identification (RFID) tags. Some RFID authentication protocols were proposed using only ultra-lightweight primitives, while the security of them must be scrutinized b...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Tieyan, DENG, Robert H., WANG, Guilin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2008
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/740
http://dx.doi.org/10.1002/sec.8
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Description
Summary:It is very challenging on designing cryptographically strong security functions that can be incorporated into lowcost radio frequency identification (RFID) tags. Some RFID authentication protocols were proposed using only ultra-lightweight primitives, while the security of them must be scrutinized before being put forth into any real application. In this paper, we present two effective attacks, namely de-snchronization attack and full-disclosure attack, against an efficient ultra-lightweight RFID mutual authentication protocol: LMAP [2], which is recently proposed by Peris-Lopez et al. These active attacks are so serious as they cannot only disable the authentication capability of an RFID tag by destroying synchronization between the tag and the RFID reader, but also disclose all secret values stored in the tag. We point out the design flaws of the protocol and based on that, we improve the protocol with a stateful variant (SLMAP). The improved protocol is more secure in sense of tag anonymity, man-in-the-middle (MITM) resistance, and forgery prevention as shown in our analysis, and is more compact due to reduced operations and memory usage on implementing such a tag.