DocumentCode :
2027548
Title :
Designing secure RFID authentication protocols is (still) a non-trivial task
Author :
Rizomiliotis, Panagiotis ; Rekleitis, Evangelos ; Gritzalis, Stefanos
Author_Institution :
Dept. of Inf. & Commun. Syst. Eng., Univ. of the Aegean, Karlovassi, Greece
fYear :
2011
fDate :
6-8 Sept. 2011
Firstpage :
73
Lastpage :
80
Abstract :
In the last few years, a plethora of RFID authentication protocols have been proposed and several security analyses have been published creating the impression that designing such a protocol must be, more or less, a straightforward task. In this paper, we investigate the security of two recently proposed schemes, showing that designing a secure RFID authentication protocol is still a demanding process. One is a mature work; in the sense that it has predecessors that have been extensively analyzed, while the other is a fresh proposal. Our security analysis demonstrates that both are weak, as they suffer from a similar desychronization attack. In addition we prove the existence of a fatal tag impersonation attack against the second one.
Keywords :
cryptographic protocols; radiofrequency identification; telecommunication security; fatal tag impersonation attack; secure RFID authentication protocols; security analysis; Authentication; Proposals; Protocols; Radiation detectors; Radiofrequency identification; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and System Security (NSS), 2011 5th International Conference on
Conference_Location :
Milan
Print_ISBN :
978-1-4577-0458-1
Type :
conf
DOI :
10.1109/ICNSS.2011.6059962
Filename :
6059962
Link To Document :
بازگشت