Security Analysis of Some RFID Authentication Protocols

被引:0
|
作者
Wang Shaohui [1 ,2 ]
Wang Faxing [3 ]
机构
[1] Nanjing Univ Post & Telecommun, Coll Comp, Nanjing 250014, Peoples R China
[2] Nanjing Univ Post & Telecommun, Coll Comp, Nanjing, Jiangsu, Peoples R China
[3] Tongda Coll Nanjing Univ Post Telecommun, Nanjing, Jiangsu, Peoples R China
关键词
RFID; Mutual Authentication Protocol; Birthday Attack; Anonymizercomponent; PRIVACY; TAGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID-based systems are becoming a widely deployed pervasive technology that is more and more used in applications where privacy sensitive information is entrusted to RFID tags. A secure RFID system should provide untraceability (preventing unauthorized tag tracking) and authentication (preserving the confidentiality). In this paper, we give the security analysis of two type of recently proposed RFID authentication protocols, one assuming the tag can compute hash functions and the other utilizing anonymizer to provide anonymity. The analysis shows that the two protocols can not resist tracking attack and desynchronization attack.
引用
收藏
页码:386 / 389
页数:4
相关论文
共 50 条
  • [1] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [2] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [3] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
  • [4] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [5] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [6] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [7] Security analysis of two recently proposed RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhao, Meng
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
  • [8] Security analysis of two recently proposed RFID authentication protocols
    Chao Lv
    Hui Li
    Jianfeng Ma
    Meng Zhao
    [J]. Frontiers of Computer Science in China, 2011, 5 : 335 - 340
  • [9] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [10] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    [J]. Wireless Personal Communications, 2018, 98 : 779 - 814