Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags

被引:31
作者
Rizomiliotis, Panagiotis [1 ]
Rekleitis, Evangelos [1 ]
Gritzalis, Stefanos [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, GR-83200 Karlovassi, Samos, Greece
关键词
Cryptography; security; protocol;
D O I
10.1109/LCOMM.2009.082117
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.
引用
收藏
页码:274 / 276
页数:3
相关论文
共 5 条
  • [1] Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
  • [2] Karthikeyan S., 2005, P 3 ACM WORKSHOP SEC, P63
  • [3] Molnar D., 2004, ACM 11 ACM C COMP CO, P210
  • [4] Song BY, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P140
  • [5] VANDEURSEN T, 2008, 2008310 IACR