Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID

被引:0
作者
Chen, Chien-Ming [1 ]
Pan, Jeng-Shyang [1 ]
Tso, Raylin [2 ]
Huang, Szu-Wei [2 ]
Wu, Mu-En [3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Innovat Informat Ind Res Ctr, Shenzhen, Peoples R China
[2] Natl Chengchi Univ, Dept Comp Sci, Taipei 11623, Taiwan
[3] Soochow Univ, Dept Math, Taipei, Taiwan
来源
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014) | 2014年
关键词
RFID; authentication protocol; security;
D O I
10.1109/IIH-MSP.2014.164
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency IDentification (RFID) is a radio communication technique. It identifies specific targets and acquires related data from the backend database by using radio frequency signal and no physical touch needed. Because of its advantages of low cost and remote identity recognition, RFID has been widely used in many applications. In 2011, Bassil et al. proposed an RFID authentication protocol based on physically unclonable functions. In this paper, we demonstrate that this protocol still insecure against forgery reader attack, de-synchronization attack and physical analytic cloning attack.
引用
收藏
页码:634 / 637
页数:4
相关论文
共 23 条
  • [1] [Anonymous], 2013, J INFORM HIDING MULT
  • [2] Bassil R., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P495
  • [3] Chen C.-M., 2014, J INFORM HIDING MULT, V5
  • [4] Eliminating rouge femtocells based on distance bounding protocol and geographic information
    Chen, Chien-Ming
    Chen, Yao-Hsin
    Lin, Yue-Hsun
    Sun, Hung-Min
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (02) : 426 - 433
  • [5] A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices
    Chen, Chien-Ming
    Wang, King-Hang
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    Sun, Hung-Min
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1318 - 1330
  • [6] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [7] Ku WC, 2003, IEICE T COMMUN, VE86B, P1682
  • [8] Li T, 2007, INT FED INFO PROC, V232, P109
  • [9] Lin C W., 2013, Journal of Information Hiding and Multimedia Signal Processing, V4, P201
  • [10] Peris-Lopez P, 2006, LECT NOTES COMPUT SC, V4277, P352