Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer

In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deurs...

Full description

Saved in:
Bibliographic Details
Main Authors: PERIS-LOPEZ, Pedro, Hernandez-Castro, Julio, Tapiador, Juan, LI, Tieyan, LI, Yingjiu
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1327
https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2326
record_format dspace
spelling sg-smu-ink.sis_research-23262018-07-13T02:56:02Z Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer PERIS-LOPEZ, Pedro Hernandez-Castro, Julio Tapiador, Juan LI, Tieyan LI, Yingjiu In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, tag location tracking, and forward traceability. Moreover, the secret update protocol is not immune to de-synchronization attacks. 2010-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1327 info:doi/10.1016/j.comnet.2009.11.007 https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Security protocols Authentication Ownership transfer RFID Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Security protocols
Authentication
Ownership transfer
RFID
Information Security
spellingShingle Security protocols
Authentication
Ownership transfer
RFID
Information Security
PERIS-LOPEZ, Pedro
Hernandez-Castro, Julio
Tapiador, Juan
LI, Tieyan
LI, Yingjiu
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
description In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, tag location tracking, and forward traceability. Moreover, the secret update protocol is not immune to de-synchronization attacks.
format text
author PERIS-LOPEZ, Pedro
Hernandez-Castro, Julio
Tapiador, Juan
LI, Tieyan
LI, Yingjiu
author_facet PERIS-LOPEZ, Pedro
Hernandez-Castro, Julio
Tapiador, Juan
LI, Tieyan
LI, Yingjiu
author_sort PERIS-LOPEZ, Pedro
title Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
title_short Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
title_full Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
title_fullStr Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
title_full_unstemmed Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
title_sort vulnerability analysis of rfid protocols for tag ownership transfer
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/sis_research/1327
https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf
_version_ 1770570967504912384