Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags

被引:31
|
作者
Rizomiliotis, Panagiotis [1 ]
Rekleitis, Evangelos [1 ]
Gritzalis, Stefanos [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, GR-83200 Karlovassi, Samos, Greece
关键词
Cryptography; security; protocol;
D O I
10.1109/LCOMM.2009.082117
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.
引用
收藏
页码:274 / 276
页数:3
相关论文
共 50 条
  • [1] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596
  • [2] A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 102 - 110
  • [3] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [4] An authentication protocol for low-cost RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 208 - 223
  • [5] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147
  • [6] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    [J]. Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [7] An Efficient RFID Authentication Protocol for Low-cost Tags
    Liu, Yanfei
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 180 - 185
  • [8] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [9] A hidden mutual authentication protocol for low-cost RFID tags
    Li, Jung-Shian
    Liu, Kun-Hsuan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (09) : 1196 - 1211
  • [10] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +