Security of an RFID Protocol for Supply Chains

被引:10
|
作者
van Deursen, Ton [1 ]
Radomirovic, Sasa [1 ]
机构
[1] Univ Luxembourg, Dept Comp Sci & Commun, Luxembourg, Luxembourg
关键词
D O I
10.1109/ICEBE.2008.44
中图分类号
F [经济];
学科分类号
02 ;
摘要
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements, and point out flaws in the proofs of the security claims.
引用
收藏
页码:568 / 573
页数:6
相关论文
共 50 条
  • [21] Intermodalism, supply chains and US security
    Szyliowicz, Joseph S.
    TRANSPORT REVIEWS, 2022, 42 (06) : 801 - 818
  • [22] Security of Information Processes in Supply Chains
    Iskanderov, Yury
    Pautov, Mikhail
    PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 13 - 22
  • [23] The security of critical mineral supply chains
    Dou Shiquan
    Xu Deyi
    Mineral Economics, 2023, 36 : 401 - 412
  • [24] Security And Risk Management in Supply Chains
    Badr, Youakim
    Stephan, Jean
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (04): : 288 - 296
  • [25] Asynchronous negotiation protocol in supply chains
    Akiyoshi, Masanori
    Komoda, Norihisa
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 2, PROCEEDINGS, 2006, : 330 - +
  • [26] On the security of RFID anti-counting security protocol (ACSP)
    Safkhani, Masoumeh
    Bagheri, Nasour
    Mahani, Ali
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 512 - 521
  • [27] Security analysis of an RFID tag search protocol
    Jannati, Hoda
    Bahrak, Behnam
    INFORMATION PROCESSING LETTERS, 2016, 116 (10) : 618 - 622
  • [28] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [29] Security flaws in a recent RFID delegation protocol
    Erguler, Imran
    Anarim, Emin
    PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) : 337 - 349
  • [30] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105