Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol

被引:0
|
作者
Seyed Farhad Aghili
Hamid Mala
机构
[1] University of Isfahan,Department of Information Technology Engineering, Faculty of Computer Engineering
关键词
RFID; EPC-C1G2; Cyclic redundancy code; Ultralightweight; Authentication; Impersonation attack; Traceability attack;
D O I
暂无
中图分类号
学科分类号
摘要
Design of ultralightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. proposed a CRC-based authentication protocol and claimed that their protocol resists against all attacks known in RFID systems. However, in this paper, we criticize employment of CRC function as a security primitive for authentication protocols by proposing two serious attacks against Maurya et al.’s protocol. These two effective and low-complexity attacks include a tag impersonation attack and a tag traceability attack. Our attacks use the linearity of the CRC function employed in this protocol. Our analyses show that the success probability of our attacks is “1” while the complexity is only one session eavesdropping, two XORs and one CRC computation. Moreover, we verify correctness of our attacks by simulating them.
引用
收藏
页码:816 / 824
页数:8
相关论文
共 50 条
  • [1] Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
    Aghili, Seyed Farhad
    Mala, Hamid
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (03) : 816 - 824
  • [2] Formal Cryptanalysis of a CRC-Based RFID Authentication Protocol
    Sohrabi-Bonab, Zahra
    Alagheband, Mahdi R.
    Aref, Mohammad Reza
    [J]. 2014 22ND IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2014, : 1642 - 1647
  • [3] An ultralightweight RFID authentication protocol with CRC and permutation
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 37 - 46
  • [4] A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC
    Maurya, Pramod Kumar
    Pal, Joydeb
    Bagchi, Satya
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) : 967 - 976
  • [5] A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC
    Pramod Kumar Maurya
    Joydeb Pal
    Satya Bagchi
    [J]. Wireless Personal Communications, 2017, 97 : 967 - 976
  • [6] A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP
    Umar Mujahid
    Muhammad Najam-ul-Islam
    Shahzad Sarwar
    [J]. Wireless Personal Communications, 2017, 94 : 725 - 744
  • [7] A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP
    Mujahid, Umar
    Najam-ul-Islam, Muhammad
    Sarwar, Shahzad
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 725 - 744
  • [8] A CRC-Based Lightweight Authentication Protocol for EPCglobal Class-1 Gen-2 Tags
    Shi, Zhicai
    Xia, Yongxiang
    Zhang, Yu
    Wang, Yihan
    Dai, Jian
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT I, 2014, 8630 : 632 - 643
  • [9] An Enhanced Ultralightweight RFID Authentication Protocol
    Yeh, Tzu-Chang
    Wu, Chia-Sheng
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 799 - 804
  • [10] A New Ultralightweight RFID Authentication Protocol with Permutation
    Tian, Yun
    Chen, Gongliang
    Li, Jianhua
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (05) : 702 - 705