Loading...

Addressing flaws in RFID authentication protocols

Habibi, M. H ; Sharif University of Technology | 2011

688 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/978-3-642-25578-6_17
  3. Publisher: 2011
  4. Abstract:
  5. The development of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy issues in great detail. Among other security characteristic of an RFID authentication protocol, untraceability and synchronization are the most important attributes. The former is strongly related to the privacy of tags and their holders, while the latter has a significant role in the security and availability parameters. In this paper, we investigate three RFID authentication protocols proposed by Duc and Kim, Song and Mitchell, and Cho, Yeo and Kim in terms of privacy and security. We analyze the protocol proposed by Duc and Kim and present desynchronization and traceability attacks. By initiating traceability, backward traceability and desynchronization attacks, we show that the protocol proposed by Song and Mitchell lacks location privacy and availability. In addition, we study the weaknesses in Cho et al.'s protocol and address its defects by applying desynchronization, traceability and backward traceability attacks. We also propose revisions to secure the Cho et al.'s protocol against the cited attacks
  6. Keywords:
  7. Authentication protocol ; RFID ; Authentication protocols ; Credit cards ; Desynchronization ; Desynchronization attack ; E-passport ; Ehealth ; Location privacy ; Personal devices ; privacy analysis ; Privacy and security ; RFID authentication ; RFID systems ; Security and privacy issues ; Sensitive application ; Untraceability ; Authentication ; Computer crime ; Cryptography ; Data privacy ; Radio frequency identification (RFID)
  8. Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7107 LNCS , 2011 , Pages 216-235 ; 03029743 (ISSN) ; 9783642255779 (ISBN)
  9. URL: http://link.springer.com/chapter/10.1007%2F978-3-642-25578-6_17