Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol

被引:1
|
作者
Mohammad Hassan Habibi
Mohammad Reza Aref
机构
[1] Pennsylvania State University,College of Information Sciences and Technology
[2] Sharif University of Technology,ISSL Lab, EE Department
来源
关键词
RFID; Authentication protocol; Security analysis; Traceability;
D O I
暂无
中图分类号
学科分类号
摘要
Many applications, such as e-passport, e-health, credit cards, and personal devices that utilize Radio frequency Identification (RFID) devices for authentication require strict security and privacy. However, RFID tags suffer from some inherent weaknesses due to restricted hardware capabilities and are vulnerable to eavesdropping, interception, or modification. The synchronization and untraceability characteristics are the major determinants of RFID authentication protocols. They are strongly related to privacy of tags and availability, respectively. In this paper, we analyze a new lightweight RFID authentication protocol, Song and Mitchell, in terms of privacy and security. We prove that not only is the scheme vulnerable to desynchronization attack, but it suffers from traceability and backward traceability as well. Finally, our improved scheme is proposed which can prevent aforementioned attacks.
引用
收藏
页码:1583 / 1596
页数:13
相关论文
共 50 条
  • [1] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596
  • [2] Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags
    Rizomiliotis, Panagiotis
    Rekleitis, Evangelos
    Gritzalis, Stefanos
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (04) : 274 - 276
  • [3] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [4] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [5] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [6] An Efficient RFID Authentication Protocol Providing Strong Privacy and Security
    Shen, Jian
    Tan, Haowen
    Moh, Sangman
    Chung, Ilyong
    Wang, Jin
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (03): : 443 - 455
  • [7] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104
  • [8] A Gen2-Based RFID Authentication Protocol for Security and Privacy
    Sun, Hung-Min
    Ting, Wei-Chih
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (08) : 1052 - 1062
  • [9] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [10] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255