• DocumentCode
    1832408
  • Title

    Tag Impersonation Attack on Two RFID Mutual Authentication Protocols

  • Author

    Safkhani, Masoumeh ; Bagheri, Nasour ; Naderi, Majid ; Luo, Yun ; Qi Chai

  • Author_Institution
    Electr. Eng. Dept., Iran Univ. of Sci. & Technol., Tehran, Iran
  • fYear
    2011
  • fDate
    22-26 Aug. 2011
  • Firstpage
    581
  • Lastpage
    584
  • Abstract
    Security concerns of RFID systems engaged a lot of researchers to design and to cryptanalyze RFID mutual authentication protocols. A suitable mutual authentication protocol for an RFID system should provide mutual authentication along with user privacy. In addition, such protocol must be resistant to active and passive attacks, e.g. man-in-the-middle attack, reply attack, reader-/tag-impersonation, denial of service and traceability attack. Among them, tag-impersonation refers to a process that the adversary\´s tag fools the legitimate reader to authenticate it as a valid tag. In this paper we exam the security of two RFID mutual authentication protocols, i.e., [6] and [17], under tag impersonation attack. We found that these two protocols share a same vulnerability in each session, the tag and the reader generates a random value respectively and they use the exclusive or (XOR) of those random values in the authentication process. We exploit this vulnerability to present two effective and efficient tag impersonation attacks against these protocols, e.g., the success probabilities of our attacks are "1" and the complexity is at most two runs of each protocol. At last, we exhibit the improved version of these protocols, which are immune from tag impersonation attacks.
  • Keywords
    authorisation; cryptographic protocols; data privacy; radiofrequency identification; active attacks; cryptanalyze RFID mutual authentication protocols; denial of service; man-in-the-middle attack; passive attacks; random value; reader-/tag-impersonation; reply attack; security; tag impersonation attack; traceability attack; user privacy; vulnerability; Authentication; Cryptography; Educational institutions; Protocols; Radiofrequency identification; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
  • Conference_Location
    Vienna
  • Print_ISBN
    978-1-4577-0979-1
  • Electronic_ISBN
    978-0-7695-4485-4
  • Type

    conf

  • DOI
    10.1109/ARES.2011.87
  • Filename
    6045980