New Security Problem in RFID Systems “Tag Killing”

作者: Dong-Guk Han , Tsuyoshi Takagi , Ho Won Kim , Kyo Il Chung

DOI: 10.1007/11751595_41

关键词: Information systemRadio-frequency identificationConfidentialityCryptographic primitiveHash chainAdversary modelComputer securityChallenge responseComputer scienceDenial-of-service attackCryptography

摘要: Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology provide benefits without threatening privacy of consumers. Using cryptographic primitives thwart security problems an approach which has been explored several years. In this paper, we introduce a problem called as “Tag Killing” aims wipe out functioning system, e.g., denial service attacks. We analyze well-known protocols are considered good solutions with adversary model and show most them have weaknesses vulnerable it.

参考文章(33)
Philippe Golle, Markus Jakobsson, Ari Juels, Paul Syverson, Universal Re-encryption for Mixnets the cryptographers’ track at the rsa conference. pp. 163- 178 ,(2004) , 10.1007/978-3-540-24660-2_14
Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won, Challenge-eesponse based RFID authentication protocol for distributed database environment international workshop on security. ,vol. 3450, pp. 70- 84 ,(2005) , 10.1007/978-3-540-32004-3_9
Christian Floerkemeier, Roland Schneider, Marc Langheinrich, Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols Ubiquitous Computing Systems. pp. 214- 231 ,(2005) , 10.1007/11526858_17
Ari Juels, Minimalist Cryptography for Low-Cost RFID Tags. security and cryptography for networks. pp. 149- 164 ,(2004)
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm Lecture Notes in Computer Science. pp. 357- 370 ,(2004) , 10.1007/978-3-540-28632-5_26
Frank Stajano, Security in Pervasive Computing SPC. pp. 6- 8 ,(2004) , 10.1007/978-3-540-39881-3_3
Jeonil Kang, DaeHun Nyang, RFID authentication protocol with strong resistance against traceability and denial of service attacks security of ad hoc and sensor networks. pp. 164- 175 ,(2005) , 10.1007/11601494_14
Ari Juels, Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract) Security in Communication Networks. pp. 149- 164 ,(2005) , 10.1007/978-3-540-30598-9_11
Gildas Avoine, Philippe Oechslin, RFID traceability: a multilayer problem financial cryptography. ,vol. 3570, pp. 125- 140 ,(2005) , 10.1007/11507840_14