Security Issues in Ultralightweight RFID Authentication Protocols

被引:7
|
作者
Zhuang, Xu [1 ]
Zhu, Yan [1 ]
Chang, Chin-Chen [2 ,3 ]
Peng, Qiang [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Sichuan, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
RFID; Ultralightweight; Protocol; Attack models; Cryptanalysis;
D O I
10.1007/s11277-017-4895-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicability. However, many studies have shown that the published ultralightweight protocols are vulnerable to various kinds of malicious attacks, which generally are empirical analysis based and protocol dependent. A general and comprehensive study of these security issues is still absent. To supplement theory study in this area, this paper propose general attack models of three most serious attacks: de-synchronization attack, replay attack and full disclosure attack, for ultralightweight RFID protocols. To formalize the de-synchronization attack, we define an artificial function named FindIndex to analyze the ability of an ultralightweight RFID protocol to keep its data integrity. The proposed de-synchronization attack can break synchronization between RFID tag and database of most ultralightweight protocols with considerable success rates. Our replay attack demonstrates the uselessness of all existing redundancy mechanisms used to solve problems caused by losing final messages. That means all the protocols adopting redundancy mechanisms that store old secrets in one side or both sides cannot resist the proposed replay attack. Furthermore, we develop full-disclosure attacks for T-function based and rotation based RFID protocols, respectively. The described full-disclosure attacks are quite effective and can reveal some or all secrets in RFID tags. Our study shows the most common design flaws in those RFID protocols so that researchers are still faced with challenges to develop a secure ultralightweight RFID protocol.
引用
下载
收藏
页码:779 / 814
页数:36
相关论文
共 50 条
  • [41] Security analysis of two ultra-lightweight RFID authentication protocols
    Li, Tieyan
    Wang, Guilin
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
  • [42] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [43] Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Phan, Raphael C. -W.
    Tapiador, Juan M. E.
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 22 - +
  • [44] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [45] MDS Code Based Ultralightweight Authentication Protocol for RFID System
    Maurya, Pramod Kumar
    Ghosh, Haradhan
    Bagchi, Satya
    IEEE ACCESS, 2023, 11 : 10563 - 10577
  • [46] URASP: An ultralightweight RFID authentication scheme using permutation operation
    Shariq, Mohd
    Singh, Karan
    Maurya, Pramod Kumar
    Ahmadian, Ali
    Ariffin, Muhammad Rezal Kamel
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (06) : 3737 - 3757
  • [47] An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
    Kumar, Anand
    Singh, Karan
    Shariq, Mohd
    Lal, Chhagan
    Conti, Mauro
    Amin, Ruhul
    Chaudhry, Shehzad Ashraf
    COMPUTER COMMUNICATIONS, 2023, 205 : 147 - 157
  • [48] Ultralightweight RFID Reader-Tag Mutual Authentication Revisited
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 166 - 173
  • [49] An ultralightweight RFID authentication protocol based on Feistel cipher structure
    Mustapha, Bensalah
    Djeddou, Mustapha
    Drouiche, Karim
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6017 - 6033
  • [50] URASP: An ultralightweight RFID authentication scheme using permutation operation
    Mohd Shariq
    Karan Singh
    Pramod Kumar Maurya
    Ali Ahmadian
    Muhammad Rezal Kamel Ariffin
    Peer-to-Peer Networking and Applications, 2021, 14 : 3737 - 3757