Security analysis of the song-mitchell authentication protocol for low-cost RFID tags

作者: Panagiotis Rizomiliotis , Evangelos Rekleitis , Stefanos Gritzalis

DOI: 10.1109/LCOMM.2009.082117

关键词:

摘要: In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. attacker that has no access to internal data a tag, is able impersonate legitimate reader/server, desynchronize tag. The very minimal computational complexity. Finally, propose simple solution fix flaw.

参考文章(5)
Boyeon Song, Chris J. Mitchell, RFID authentication protocol for low-cost tags wireless network security. pp. 140- 147 ,(2008) , 10.1145/1352533.1352556
Sindhu Karthikeyan, Mikhail Nesterenko, RFID security without extensive cryptography Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05. pp. 63- 67 ,(2005) , 10.1145/1102219.1102229
David Molnar, David Wagner, Privacy and security in library RFID: issues, practices, and architectures computer and communications security. pp. 210- 219 ,(2004) , 10.1145/1030083.1030112
D. Henrici, P. Muller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second. pp. 149- 153 ,(2004) , 10.1109/PERCOMW.2004.1276922
Sasa Radomirovic, Ton van Deursen, Attacks on RFID Protocols IACR Cryptology ePrint Archive. ,vol. 2008, pp. 310- ,(2008)