Security Issues in Ultralightweight RFID Authentication Protocols

被引:7
|
作者
Zhuang, Xu [1 ]
Zhu, Yan [1 ]
Chang, Chin-Chen [2 ,3 ]
Peng, Qiang [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Sichuan, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
RFID; Ultralightweight; Protocol; Attack models; Cryptanalysis;
D O I
10.1007/s11277-017-4895-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicability. However, many studies have shown that the published ultralightweight protocols are vulnerable to various kinds of malicious attacks, which generally are empirical analysis based and protocol dependent. A general and comprehensive study of these security issues is still absent. To supplement theory study in this area, this paper propose general attack models of three most serious attacks: de-synchronization attack, replay attack and full disclosure attack, for ultralightweight RFID protocols. To formalize the de-synchronization attack, we define an artificial function named FindIndex to analyze the ability of an ultralightweight RFID protocol to keep its data integrity. The proposed de-synchronization attack can break synchronization between RFID tag and database of most ultralightweight protocols with considerable success rates. Our replay attack demonstrates the uselessness of all existing redundancy mechanisms used to solve problems caused by losing final messages. That means all the protocols adopting redundancy mechanisms that store old secrets in one side or both sides cannot resist the proposed replay attack. Furthermore, we develop full-disclosure attacks for T-function based and rotation based RFID protocols, respectively. The described full-disclosure attacks are quite effective and can reveal some or all secrets in RFID tags. Our study shows the most common design flaws in those RFID protocols so that researchers are still faced with challenges to develop a secure ultralightweight RFID protocol.
引用
收藏
页码:779 / 814
页数:36
相关论文
共 50 条
  • [1] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    [J]. Wireless Personal Communications, 2018, 98 : 779 - 814
  • [2] On Ultralightweight RFID Authentication Protocols
    D'Arco, Paolo
    De Santis, Alfredo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 548 - 563
  • [3] Security Framework of Ultralightweight Mutual Authentication Protocols for Low Cost RFID tags
    Khalid, Madiha
    Mujahid, Umar
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 26 - 31
  • [4] On the Security of Chien's Ultralightweight RFID Authentication Protocol
    Sun, Hung-Min
    Ting, Wei-Chih
    Wang, King-Hang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 315 - 317
  • [5] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [6] Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags
    Khalid, Madiha
    Mujahid, Umar
    Muhammad, Najam-ul-Islam
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [7] Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID
    Xiao, Meihua
    Li, Wei
    Zhong, Xiaomei
    Yang, Ke
    Chen, Jia
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (05) : 1025 - 1032
  • [8] Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID
    XIAO Meihua
    LI Wei
    ZHONG Xiaomei
    YANG Ke
    CHEN Jia
    [J]. Chinese Journal of Electronics, 2019, 28 (05) : 1025 - 1032
  • [9] Two Ultralightweight Authentication Protocols for Low-Cost RFID Tags
    Lee, Yung-Cheng
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 425S - 431S
  • [10] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +