作者: Panagiotis Rizomiliotis , Evangelos Rekleitis , Stefanos Gritzalis
DOI: 10.1109/LCOMM.2009.082117
关键词:
摘要: In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. attacker that has no access to internal data a tag, is able impersonate legitimate reader/server, desynchronize tag. The very minimal computational complexity. Finally, propose simple solution fix flaw.