Loading...
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
Habibi, M. H ; Sharif University of Technology | 2011
549
Viewed
- Type of Document: Article
- DOI: 10.1007/978-3-642-21040-2_18
- Publisher: 2011
- Abstract:
- Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we show that the proposed protocol does not have cited security features properly. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al.'s protocol does not assure the untraceabilitiy and backwarduntraceabilitiy attributes. We also will propose our revision to safeguard the Yeh et al.'s protocol against cited attacks
- Keywords:
- RFID ; Security analysis ; Traceability attack ; EPC C-1 G-2 standard ; Mutual authentication ; Traceability attack ; Forward secrecy ; Mutual authentication protocols ; Security features ; Authentication ; Mobile devices ; Security systems ; Standards ; Aluminum ; Mobile security ; Radio frequency identification (RFID) ; Secure communication ; Wireless telecommunication systems ; Security of data
- Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1 June 2011 through 3 June 2011 ; Volume 6633 LNCS , June , 2011 , Pages 254-263 ; 03029743 (ISSN) ; 9783642210396 (ISBN)
- URL: http://link.springer.com/chapter/10.1007%2F978-3-642-21040-2_18