The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol
It is very challenging on designing cryptographically strong security functions that can be incorporated into lowcost radio frequency identification (RFID) tags. Some RFID authentication protocols were proposed using only ultra-lightweight primitives, while the security of them must be scrutinized b...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/740 http://dx.doi.org/10.1002/sec.8 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Summary: | It is very challenging on designing cryptographically strong security functions that can be incorporated into lowcost radio frequency identification (RFID) tags. Some RFID authentication protocols were proposed using only ultra-lightweight primitives, while the security of them must be scrutinized before being put forth into any real application. In this paper, we present two effective attacks, namely de-snchronization attack and full-disclosure attack, against an efficient ultra-lightweight RFID mutual authentication protocol: LMAP [2], which is recently proposed by Peris-Lopez et al. These active attacks are so serious as they cannot only disable the authentication capability of an RFID tag by destroying synchronization between the tag and the RFID reader, but also disclose all secret values stored in the tag. We point out the design flaws of the protocol and based on that, we improve the protocol with a stateful variant (SLMAP). The improved protocol is more secure in sense of tag anonymity, man-in-the-middle (MITM) resistance, and forgery prevention as shown in our analysis, and is more compact due to reduced operations and memory usage on implementing such a tag. |
---|