Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deurs...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1327 https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2326 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-23262018-07-13T02:56:02Z Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer PERIS-LOPEZ, Pedro Hernandez-Castro, Julio Tapiador, Juan LI, Tieyan LI, Yingjiu In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, tag location tracking, and forward traceability. Moreover, the secret update protocol is not immune to de-synchronization attacks. 2010-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1327 info:doi/10.1016/j.comnet.2009.11.007 https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Security protocols Authentication Ownership transfer RFID Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Security protocols Authentication Ownership transfer RFID Information Security |
spellingShingle |
Security protocols Authentication Ownership transfer RFID Information Security PERIS-LOPEZ, Pedro Hernandez-Castro, Julio Tapiador, Juan LI, Tieyan LI, Yingjiu Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer |
description |
In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, tag location tracking, and forward traceability. Moreover, the secret update protocol is not immune to de-synchronization attacks. |
format |
text |
author |
PERIS-LOPEZ, Pedro Hernandez-Castro, Julio Tapiador, Juan LI, Tieyan LI, Yingjiu |
author_facet |
PERIS-LOPEZ, Pedro Hernandez-Castro, Julio Tapiador, Juan LI, Tieyan LI, Yingjiu |
author_sort |
PERIS-LOPEZ, Pedro |
title |
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer |
title_short |
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer |
title_full |
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer |
title_fullStr |
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer |
title_full_unstemmed |
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer |
title_sort |
vulnerability analysis of rfid protocols for tag ownership transfer |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2010 |
url |
https://ink.library.smu.edu.sg/sis_research/1327 https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf |
_version_ |
1770570967504912384 |