Scalability and Security Conflict for RFID Authentication Protocols

被引:0
|
作者
Imran Erguler
Emin Anarim
机构
[1] TUBITAK-UEKAE,Electrical
[2] Bogazici University,Electronics Engineering Department
来源
关键词
RFID; Authentication; Privacy; Traceability; Scalability;
D O I
暂无
中图分类号
学科分类号
摘要
RFID technology continues to flourish as an inherent part of virtually every ubiquitous environment. However, it became clear that the public—implying the industry—seriously needs mechanisms emerging the security and privacy issues for increasing RFID applications. As the nodes of RFID systems mostly suffer from low computational power and small memory size, various attempts which propose to implement the existing security primitives and protocols, have ignored the realm of the cost limitations and failed. In this study, two recently proposed protocols—SSM and LRMAP—claiming to meet the standard privacy and security requirements are analyzed. The design of both protocols based on defining states where the server authenticates the tag in constant time in a more frequent normal state and needs a linear search in a rare abnormal states. Although both protocols claim to provide untraceability criteria in their design objectives, we outline a generic attack that both protocols failed to fulfill this claim. Moreover, we showed that the SSM protocol is vulnerable to a desynchronization attack which prevents a server from authenticating a legitimate tag. Resultantly, we conclude that defining computationally unbalanced tag states yields to a security/scalability conflict for RFID authentication protocols.
引用
下载
收藏
页码:43 / 56
页数:13
相关论文
共 50 条
  • [1] Scalability and Security Conflict for RFID Authentication Protocols
    Erguler, Imran
    Anarim, Emin
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 59 (01) : 43 - 56
  • [2] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [3] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [4] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [5] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    Wireless Personal Communications, 2018, 98 : 779 - 814
  • [6] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [7] More on the Security of Linear RFID Authentication Protocols
    Krause, Matthias
    Stegemann, Dirk
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196
  • [8] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [9] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Xie, Shaohao
    Zhang, Fangguo
    Cheng, Rong
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 71 - 86
  • [10] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Shaohao Xie
    Fangguo Zhang
    Rong Cheng
    Wireless Personal Communications, 2021, 117 : 71 - 86