Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards

被引:34
作者
Han, Daewan [1 ]
Kwon, Daesung [1 ]
机构
[1] Natl Secur Res Inst, Taejon 305350, South Korea
关键词
RFID; EPCglobal; Authentication; Impersonation; Forgery; Dos attack;
D O I
10.1016/j.csi.2008.06.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Chien et al. proposed an RFID authentication protocol, which consists of only the cyclic redundancy code (CRC) and the pseudo-random number generator (PRNG) [H. Chien, C. Chen, Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces, vol. 29, Elsevier, 2007, pp. 254-259]. They claimed that the protocol conforms to current EPC tags, and would be secure against all attacks on RFID systems. However, in this paper, we show that the protocol is not secure; firstly an attacker can impersonate a valid tag temporarily by a single eavesdropping. Secondly the attacker can forge a tag permanently by eavesdropping two consecutive sessions. Finally he can make a valid tag useless (DoS attack) by modifying the second attack slightly. The computational complexities of the attacks are so practicable that Chien et al.'s protocol cannot enhance the RFID security any more than the original EPC standard. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:648 / 652
页数:5
相关论文
共 12 条
[1]  
Avoine G., 2005, THESIS EPFL LAUSANNE
[2]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[3]  
*EPCGLOBAL INC, EPCTM RAD FREQ ID PR
[4]  
Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
[5]  
FELDHOFER M, 2006, WORKSH RFID SEC RFID
[6]  
Finkenzeller K., 1999, RFID HDB RADIO FREQU
[7]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[8]  
Juels A, 2005, LECT NOTES COMPUT SC, V3621, P293
[9]  
Juels A., 2003, P 10 ACM C COMPUTER, P103, DOI DOI 10.1145/948109.948126
[10]  
Karthikeyan S., 2005, P 3 ACM WORKSHOP SEC, P63, DOI DOI 10.1145/1102219.1102229