Cryptanalysis of the LCSS RFID Authentication Protocol

被引:1
作者
Cao, Tianjie [1 ]
Shen, Peng [1 ]
Bertino, Elisa [2 ]
机构
[1] China Univ Min & Technol, Sch Comp, Xuzhou 221116, Peoples R China
[2] Purdue Univ, CERIAS, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY | 2008年
基金
美国国家科学基金会;
关键词
D O I
10.1109/ISECS.2008.73
中图分类号
F [经济];
学科分类号
02 ;
摘要
To reduce the computational load on both the back-end database and the tags, Ha et al. proposed a low-cost and strong-security (LCSS) RFID authentication protocol. In this paper, we identify two effective attacks, a desynchronization attack and a spoofing attack, against the LCSS protocol. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a legal tag to spoof the RFID reader by extracting the ID of a specific tag during the authentication process. Moreover, we point out the potential countermeasure by adding an integrity check to improve the security.
引用
收藏
页码:305 / +
页数:2
相关论文
共 50 条
[31]   Cryptanalysis and Improvement of Robust Deniable Authentication Protocol [J].
Li, Fagen ;
Takagi, Tsuyoshi .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) :1391-1398
[32]   Cryptanalysis and Improvement of RFID Ownership Transfer Protocol [J].
Chen, Xiuqing ;
Zhao, Qiang ;
Cao, Tianjie ;
Zhai, Jingxuan .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12) :165-173
[33]   Simple mutual authentication protocol for RFID [J].
Renault, Eric ;
Bournerdassi, Selma .
TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, :1252-+
[34]   An Enhanced Authentication Protocol for RFID Systems [J].
Hosseinzadeh, Mehdi ;
Ahmed, Omed Hassan ;
Ahmed, Sarkar Hasan ;
Trinh, Cuong ;
Bagheri, Nasour ;
Kumari, Saru ;
Lansky, Jan ;
Huynh, Bao .
IEEE ACCESS, 2020, 8 :126977-126987
[35]   An authentication protocol in mobile RFID environment [J].
Sun, Hung-Min ;
Lu, Chen-En ;
Chen, Shuai-Min .
TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, :1143-+
[36]   Cryptanalysis of a hybrid authentication protocol for large mobile networks [J].
Tang, QA ;
Mitchell, CJ .
JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (04) :496-501
[37]   Cryptanalysis on dynamic authentication protocol for personal communication system [J].
Chien, HY ;
Chen, YH ;
Jan, JK ;
Tseng, YM .
ELECTRONICS LETTERS, 2001, 37 (14) :895-896
[38]   A Lightweight Authentication Protocol for Mobile RFID [J].
Pan, Tao ;
Zuo, Kai-Zhong ;
Wang, Tao-Chun ;
Deng, Chun-Hong .
International Journal of Network Security, 2024, 26 (02) :190-199
[39]   Enhancements to a Lightweight RFID Authentication Protocol [J].
Zhang, Xiaowen ;
Zhang, Zhanyang ;
Wei, Xinzhou .
ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, :454-+
[40]   Authentication Protocol in Mobile RFID Network [J].
Yang, Ming Hour ;
Luo, Jia-Ning .
2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, :108-+