Security of an RFID Protocol for Supply Chains

被引:10
|
作者
van Deursen, Ton [1 ]
Radomirovic, Sasa [1 ]
机构
[1] Univ Luxembourg, Dept Comp Sci & Commun, Luxembourg, Luxembourg
关键词
D O I
10.1109/ICEBE.2008.44
中图分类号
F [经济];
学科分类号
02 ;
摘要
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements, and point out flaws in the proofs of the security claims.
引用
收藏
页码:568 / 573
页数:6
相关论文
共 50 条
  • [1] RFID security issues in military supply chains
    Xiao, Qinghan
    Boulet, Cam
    Gibbons, Thomas
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 599 - +
  • [2] RFID-enabled Logistic Flow Tracing in Supply Chains: Communication, Protocol, and Security
    Zuo, Yanjun
    O'Keefe, Timothy
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [3] Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains
    Sidorov, Michail
    Ong, Ming Tze
    Sridharan, Ravivarma Vikneswaren
    Nakamura, Junya
    Ohmura, Ren
    Khor, Jing Huey
    [J]. IEEE ACCESS, 2019, 7 : 7273 - 7285
  • [4] A Lightweight Path Authentication Protocol for RFID-based Supply Chains
    Qian, Yuyin
    Zeng, Peng
    Shen, Zuming
    Choo, Kim-Kwang Raymond
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1297 - 1302
  • [5] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Muhammad Arslan Akram
    Adnan Noor Mian
    [J]. Wireless Personal Communications, 2022, 126 : 1881 - 1894
  • [6] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1881 - 1894
  • [7] Security and Privacy for Data Mining of RFID-Enabled Product Supply Chains
    Yao, Xiaoming
    Du, Wencai
    Zhou, Xiaoyi
    Ma, Jixin
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1037 - 1046
  • [8] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [9] Prediction of RFID Performance in Supply Chains
    Soon, Chin Boo
    Gutierrez, Jairo A.
    [J]. AMCIS 2010 PROCEEDINGS, 2010,
  • [10] A Framework for RFID Deployment in Supply Chains
    Bradley, James R.
    Guerrero, Hector H.
    [J]. IT PROFESSIONAL, 2010, 12 (04) : 44 - 50