Loading...

Security and privacy analysis of song-mitchell RFID authentication protocol

Habibi, M. H ; Sharif University of Technology | 2013

448 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s11277-012-0652-0
  3. Publisher: 2013
  4. Abstract:
  5. Many applications, such as e-passport, e-health, credit cards, and personal devices that utilize Radio frequency Identification (RFID) devices for authentication require strict security and privacy. However, RFID tags suffer from some inherent weaknesses due to restricted hardware capabilities and are vulnerable to eavesdropping, interception, or modification. The synchronization and untraceability characteristics are the major determinants of RFID authentication protocols. They are strongly related to privacy of tags and availability, respectively. In this paper, we analyze a new lightweight RFID authentication protocol, Song and Mitchell, in terms of privacy and security. We prove that not only is the scheme vulnerable to desynchronization attack, but it suffers from traceability and backward traceability as well. Finally, our improved scheme is proposed which can prevent aforementioned attacks
  6. Keywords:
  7. Authentication protocol ; RFID ; Authentication protocols ; De-synchronization attacks ; Privacy and security ; Rfid authentication protocols ; Security analysis ; Security and privacy ; Security and privacy analysis ; Traceability ; Authentication ; Security systems ; Radio frequency identification (RFID)
  8. Source: Wireless Personal Communications ; Volume 69, Issue 4 , May , 2013 , Pages 1583-1596 ; 09296212 (ISSN)
  9. URL: http://link.springer.com/article/10.1007%2Fs11277-012-0652-0