Security of an RFID Protocol for Supply Chains

被引:10
|
作者
van Deursen, Ton [1 ]
Radomirovic, Sasa [1 ]
机构
[1] Univ Luxembourg, Dept Comp Sci & Commun, Luxembourg, Luxembourg
关键词
D O I
10.1109/ICEBE.2008.44
中图分类号
F [经济];
学科分类号
02 ;
摘要
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements, and point out flaws in the proofs of the security claims.
引用
收藏
页码:568 / 573
页数:6
相关论文
共 50 条
  • [31] A Mutual RFID Security Protocol for Wireless Reader
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 43 - 52
  • [32] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [33] AES Algorithm Applied on Security Protocol of RFID
    Han, Liquan
    Yuan, Fang
    Jiang, Yuqiang
    3RD AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS (CIB 2015), 2015, : 1 - 5
  • [34] Security flaws in a recent RFID delegation protocol
    Imran Erguler
    Emin Anarim
    Personal and Ubiquitous Computing, 2012, 16 : 337 - 349
  • [35] Security flaws in a recent ultralightweight RFID protocol
    Peris-Lopez P.
    Hernandez-Castro J.C.
    Tapiador J.M.E.
    Van Der Lubbe J.C.A.
    Cryptology and Information Security Series, 2010, 4 : 83 - 94
  • [36] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510
  • [37] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [38] Hierarchical RFID Tag Ownership and Transfer in Supply Chains
    Zhou, Wei
    Yoon, Eun Jung
    Piramuthu, Selwyn
    E-LIFE: WEB-ENABLED CONVERGENCE OF COMMERCE, WORK, AND SOCIAL LIFE, 2012, 108 : 390 - 398
  • [39] Challenges associated with RFID tag implementations in supply chains
    Kapoor, Gaurav
    Zhou, Wei
    Piramuthu, Selwyn
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (06) : 526 - 533
  • [40] Computational Model for Trust Management in RFID Supply Chains
    Mahinderjit-Singh, Manmeet
    Li, Xue
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 965 - 971