On Ultralightweight RFID Authentication Protocols

被引:72
|
作者
D'Arco, Paolo [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84084 Fisciano 1, SA, Italy
关键词
RFID technology; cryptographic protocols; cryptoanalysis; SASI;
D O I
10.1109/TDSC.2010.75
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A recent research trend, motivated by the massive deployment of RFID technology, looks at cryptographic protocols for securing communication between entities in which some of the parties have very limited computing capabilities. In this paper, we focus our attention on SASI, a new RFID authentication protocol, designed for providing Strong Authentication and Strong Integrity. SASI is a good representative of a family of RFID authentication protocols, referred to as Ultralightweight RFID authentication protocols. These protocols, suitable for passive Tags with limited computational power and storage, involve simple bitwise operations such as and, or, exclusive or, modular addition, and cyclic shift operations. They are efficient, fit the hardware constraints, and can be seen as an example of the above research trend. However, the main concern is the real security of these protocols, which are often supported only by apparently reasonable and intuitive arguments. The contribution we provide with this work is the following: we start by showing some weaknesses in the SASI protocol, and then, we describe how such weaknesses, through a sequence of simple steps, can be used to compute in an efficient way all secret data used for the authentication process. Specifically, we describe three attacks: 1) a desynchronization attack, through which an adversary can break the synchronization between the RFID Reader and the Tag; 2) an identity disclosure attack, through which an adversary can compute the identity of the Tag; and 3) a full disclosure attack, which enables an adversary to retrieve all secret data stored in the Tag. Then, we present some experimental results, obtained by running several tests on an implementation of the protocol, in order to evaluate the performance of the proposed attacks, which confirm that the attacks are effective and efficient. It comes out that an active adversary by interacting with a Tag more or less three hundred times, makes the authentication protocol completely useless. Finally, we close the paper with some observations. The cryptoanalysis of SASI gets some new light on the ultralightweight approach, and can also serve as a warning to researchers working on the field and tempted to apply these techniques. Indeed, the results of this work, rise serious questions regarding the limits of the ultralightweight family of protocols, and on the benefits of these ad hoc protocol design strategies and informal security analysis.
引用
收藏
页码:548 / 563
页数:16
相关论文
共 50 条
  • [1] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [2] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    [J]. Wireless Personal Communications, 2018, 98 : 779 - 814
  • [3] Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags
    Khalid, Madiha
    Mujahid, Umar
    Muhammad, Najam-ul-Islam
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [4] Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID
    Xiao, Meihua
    Li, Wei
    Zhong, Xiaomei
    Yang, Ke
    Chen, Jia
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (05) : 1025 - 1032
  • [5] Formal Analysis and Improvement on Ultralightweight Mutual Authentication Protocols of RFID
    XIAO Meihua
    LI Wei
    ZHONG Xiaomei
    YANG Ke
    CHEN Jia
    [J]. Chinese Journal of Electronics, 2019, 28 (05) : 1025 - 1032
  • [6] Two Ultralightweight Authentication Protocols for Low-Cost RFID Tags
    Lee, Yung-Cheng
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 425S - 431S
  • [7] Security Framework of Ultralightweight Mutual Authentication Protocols for Low Cost RFID tags
    Khalid, Madiha
    Mujahid, Umar
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 26 - 31
  • [8] An Enhanced Ultralightweight RFID Authentication Protocol
    Yeh, Tzu-Chang
    Wu, Chia-Sheng
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 799 - 804
  • [9] Efficient Ultralightweight RFID Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 102 - 108
  • [10] An ultralightweight RFID authentication protocol with CRC and permutation
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 37 - 46