Security Issues in Ultralightweight RFID Authentication Protocols

被引:7
|
作者
Zhuang, Xu [1 ]
Zhu, Yan [1 ]
Chang, Chin-Chen [2 ,3 ]
Peng, Qiang [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Sichuan, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
RFID; Ultralightweight; Protocol; Attack models; Cryptanalysis;
D O I
10.1007/s11277-017-4895-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicability. However, many studies have shown that the published ultralightweight protocols are vulnerable to various kinds of malicious attacks, which generally are empirical analysis based and protocol dependent. A general and comprehensive study of these security issues is still absent. To supplement theory study in this area, this paper propose general attack models of three most serious attacks: de-synchronization attack, replay attack and full disclosure attack, for ultralightweight RFID protocols. To formalize the de-synchronization attack, we define an artificial function named FindIndex to analyze the ability of an ultralightweight RFID protocol to keep its data integrity. The proposed de-synchronization attack can break synchronization between RFID tag and database of most ultralightweight protocols with considerable success rates. Our replay attack demonstrates the uselessness of all existing redundancy mechanisms used to solve problems caused by losing final messages. That means all the protocols adopting redundancy mechanisms that store old secrets in one side or both sides cannot resist the proposed replay attack. Furthermore, we develop full-disclosure attacks for T-function based and rotation based RFID protocols, respectively. The described full-disclosure attacks are quite effective and can reveal some or all secrets in RFID tags. Our study shows the most common design flaws in those RFID protocols so that researchers are still faced with challenges to develop a secure ultralightweight RFID protocol.
引用
下载
收藏
页码:779 / 814
页数:36
相关论文
共 50 条
  • [31] Security analysis of two recently proposed RFID authentication protocols
    Chao Lv
    Hui Li
    Jianfeng Ma
    Meng Zhao
    Frontiers of Computer Science in China, 2011, 5 : 335 - 340
  • [32] An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication
    Jia, Qingxuan
    Wang, Xin
    Gao, Xin
    Gao, Panpan
    Zhao, Bing
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1966 - +
  • [33] Cryptanalysis of Mutual Ultralightweight Authentication Protocols: SASI & RAPP
    Ul Ain, Qurat
    Mahmood, Yusra
    Mujahid, Umar
    Najam-ul-islam, M.
    2014 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), 2014, : 136 - 145
  • [34] Ultralightweight RFID Reader-Tag Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 613 - 616
  • [35] A Novel Efficient Ultralightweight Authentication Algorithm for RFID Systems
    Labbi, Zouheir
    Senhadji, Mohamed
    Maarof, Ahmed
    Belkasmi, Mostafa
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), 2016, : 45 - 48
  • [36] Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
    Ahmadian, Zahra
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (07) : 1140 - 1151
  • [37] Security flaws in a recent ultralightweight RFID protocol
    Peris-Lopez P.
    Hernandez-Castro J.C.
    Tapiador J.M.E.
    Van Der Lubbe J.C.A.
    Cryptology and Information Security Series, 2010, 4 : 83 - 94
  • [38] Privacy-friendly synchronized ultralightweight authentication protocols in the storm
    Avoine, Gildas
    Carpent, Xavier
    Martin, Benjamin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) : 826 - 843
  • [39] Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI
    Phan, Raphael C. -W.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (04) : 316 - 320
  • [40] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security
    Rajaguru, K.
    Hansdah, R. C.
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495