Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol

被引:6
作者
Habibi, Mohammad Hassan [1 ]
Aref, Mohammad Reza [2 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[2] Sharif Univ Technol, ISSL Lab, EE Dept, Tehran, Iran
关键词
RFID; Authentication protocol; Security analysis; Traceability; ATTACKS;
D O I
10.1007/s11277-012-0652-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Many applications, such as e-passport, e-health, credit cards, and personal devices that utilize Radio frequency Identification (RFID) devices for authentication require strict security and privacy. However, RFID tags suffer from some inherent weaknesses due to restricted hardware capabilities and are vulnerable to eavesdropping, interception, or modification. The synchronization and untraceability characteristics are the major determinants of RFID authentication protocols. They are strongly related to privacy of tags and availability, respectively. In this paper, we analyze a new lightweight RFID authentication protocol, Song and Mitchell, in terms of privacy and security. We prove that not only is the scheme vulnerable to desynchronization attack, but it suffers from traceability and backward traceability as well. Finally, our improved scheme is proposed which can prevent aforementioned attacks.
引用
收藏
页码:1583 / 1596
页数:14
相关论文
共 40 条
[1]  
Alomair B, 2007, LECT NOTES COMPUT SC, V4817, P102
[2]  
[Anonymous], P WISE 05
[3]  
[Anonymous], 2013, RFID Journal
[4]  
Avoine G, 2006, LECT NOTES COMPUT SC, V3897, P291
[5]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[6]  
Avoine G., 2005, THESIS EPFL
[7]  
Avoine G, 2005, 2005049 CRYPT EPRINT
[8]  
Banks J, 2007, RFID APPLIED, P1, DOI 10.1002/9780470168226
[9]  
BURMESTER M, 2006, SECURECOMM 2006
[10]  
Carluccio D, 2006, LECT NOTES COMPUT SC, V4298, P391