On Ultralightweight RFID Authentication Protocols

被引:72
|
作者
D'Arco, Paolo [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84084 Fisciano 1, SA, Italy
关键词
RFID technology; cryptographic protocols; cryptoanalysis; SASI;
D O I
10.1109/TDSC.2010.75
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A recent research trend, motivated by the massive deployment of RFID technology, looks at cryptographic protocols for securing communication between entities in which some of the parties have very limited computing capabilities. In this paper, we focus our attention on SASI, a new RFID authentication protocol, designed for providing Strong Authentication and Strong Integrity. SASI is a good representative of a family of RFID authentication protocols, referred to as Ultralightweight RFID authentication protocols. These protocols, suitable for passive Tags with limited computational power and storage, involve simple bitwise operations such as and, or, exclusive or, modular addition, and cyclic shift operations. They are efficient, fit the hardware constraints, and can be seen as an example of the above research trend. However, the main concern is the real security of these protocols, which are often supported only by apparently reasonable and intuitive arguments. The contribution we provide with this work is the following: we start by showing some weaknesses in the SASI protocol, and then, we describe how such weaknesses, through a sequence of simple steps, can be used to compute in an efficient way all secret data used for the authentication process. Specifically, we describe three attacks: 1) a desynchronization attack, through which an adversary can break the synchronization between the RFID Reader and the Tag; 2) an identity disclosure attack, through which an adversary can compute the identity of the Tag; and 3) a full disclosure attack, which enables an adversary to retrieve all secret data stored in the Tag. Then, we present some experimental results, obtained by running several tests on an implementation of the protocol, in order to evaluate the performance of the proposed attacks, which confirm that the attacks are effective and efficient. It comes out that an active adversary by interacting with a Tag more or less three hundred times, makes the authentication protocol completely useless. Finally, we close the paper with some observations. The cryptoanalysis of SASI gets some new light on the ultralightweight approach, and can also serve as a warning to researchers working on the field and tempted to apply these techniques. Indeed, the results of this work, rise serious questions regarding the limits of the ultralightweight family of protocols, and on the benefits of these ad hoc protocol design strategies and informal security analysis.
引用
收藏
页码:548 / 563
页数:16
相关论文
共 50 条
  • [41] Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Phan, Raphael C. -W.
    Tapiador, Juan M. E.
    Li, Tieyan
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 427 - +
  • [42] Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains
    Sidorov, Michail
    Ong, Ming Tze
    Sridharan, Ravivarma Vikneswaren
    Nakamura, Junya
    Ohmura, Ren
    Khor, Jing Huey
    [J]. IEEE ACCESS, 2019, 7 : 7273 - 7285
  • [43] A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP
    Umar Mujahid
    Muhammad Najam-ul-Islam
    Shahzad Sarwar
    [J]. Wireless Personal Communications, 2017, 94 : 725 - 744
  • [44] Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
    Seyed Farhad Aghili
    Hamid Mala
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 816 - 824
  • [45] Attacks on Recent RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
  • [46] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [47] Serverless search and authentication protocols for RFID
    Tan, Chiu C.
    Sheng, Bo
    Li, Qun
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
  • [48] Mutual Authentication Protocols for RFID Systems
    Omer, Ashrar A.
    Thomas, Johnson P.
    Zhu, Ling
    [J]. INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2008, 5 (04) : 348 - 365
  • [49] Addressing Flaws in RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    Ma, Di
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 216 - +
  • [50] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283