Security analysis of two recently proposed RFID authentication protocols

被引:0
|
作者
Chao Lv
Hui Li
Jianfeng Ma
Meng Zhao
机构
[1] Xidian University,Key Laboratory of Computer Networks and Information Security
[2] Yanshan University,Department of Computer Science and Technology
关键词
radio frequency identification (RFID) protocol; tag information leakage; untraceability attack;
D O I
暂无
中图分类号
学科分类号
摘要
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification.
引用
收藏
页码:335 / 340
页数:5
相关论文
共 50 条
  • [1] Security analysis of two recently proposed RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhao, Meng
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
  • [2] Vulnerabilities of two Recently RFID Authentication Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 475 - 480
  • [3] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [4] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [5] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
  • [6] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [7] Security analysis of two ultra-lightweight RFID authentication protocols
    Li, Tieyan
    Wang, Guilin
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
  • [8] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [9] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [10] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920