A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

被引:0
|
作者
Abughazalah, Sarah [1 ]
Markantonakis, Konstantinos [1 ]
Mayes, Keith [1 ]
机构
[1] Univ London, Smart Card Ctr Informat Secur Grp SCC ISG, Egham TW20 0EX, Surrey, England
关键词
RFID; mutual authentication; protocol; security; privacy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we describe a vulnerability against one of the most efficient authentication protocols for low-cost RFID tags proposed by Song. The protocol defines a weak attacker as an intruder which can manipulate the communication between a reader and tag without accessing the internal data of a tag. It has been claimed that the Song protocol is able to resist weak attacks, such as denial of service (DoS) attack; however, we found that a weak attacker is able to desynchronise a tag, which is one kind of DoS attack. Moreover, the database in the Song protocol must use a brute force search to retrieve the tag's records affecting the operational performance of the server. Finally, we propose an improved protocol which can prevent the security problems in Song protocol and enhance the server's scalability performance.
引用
收藏
页码:102 / 110
页数:9
相关论文
共 50 条
  • [1] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [2] An authentication protocol for low-cost RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 208 - 223
  • [3] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147
  • [4] An Efficient RFID Authentication Protocol for Low-cost Tags
    Liu, Yanfei
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 180 - 185
  • [5] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [6] Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags
    Rizomiliotis, Panagiotis
    Rekleitis, Evangelos
    Gritzalis, Stefanos
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (04) : 274 - 276
  • [7] A hidden mutual authentication protocol for low-cost RFID tags
    Li, Jung-Shian
    Liu, Kun-Hsuan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (09) : 1196 - 1211
  • [8] Low-cost authentication protocol for passive, computation capable RFID tags
    Khan, Gul N.
    Moessner, Markus
    [J]. WIRELESS NETWORKS, 2015, 21 (02) : 565 - 580
  • [9] Low-cost authentication protocol for passive, computation capable RFID tags
    Gul N. Khan
    Markus Moessner
    [J]. Wireless Networks, 2015, 21 : 565 - 580
  • [10] A privacy-preserving lightweight authentication protocol for low-cost RFID tags
    Yu, Shucheng
    Ren, Kui
    Lou, Wenjing
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2939 - +