Title :
Analysis against secret redundancy mechanism for RFID authentication protocol
Author :
Lo, N.W. ; Yeh, Kuo-Hui ; Chen, Hsuan-Yu
Author_Institution :
Dept. of Inf. Manage., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan
Abstract :
To deliver robust privacy-aware RFID authentication scheme against malicious tracing activities, automatically secret updating mechanism is exploited at both tag end and server/database end during each authentication session to support forward/backward security. Nevertheless, an adversary may easily interrupt transmission of necessary key update message in each authentication session such that key resynchronization between tag and server/database cannot be completed. For this reason, current RFID authentication protocols have applied secret/key redundancy design to allow a tag with desynchronized secret to successfully communicate with server/database in its next authentication session. In this paper, we identify that several RFID authentication protocols cannot defend against desynchronization attack. All of these schemes are insecure because the secret/key redundancy mechanisms are not well-designed.
Keywords :
cryptographic protocols; radiofrequency identification; telecommunication security; RFID authentication protocol; authentication session; automatically secret updating mechanism; forward-backward security; key update message; malicious tracing activities; robust privacy-aware RFID authentication scheme; secret redundancy mechanism; secret-key redundancy; server-database; Authentication; Privacy; Protocols; Radiofrequency identification; Redundancy; Servers; Authentication; Privacy; RFID; Secret Redundancy; Security;
Conference_Titel :
Communication, Networks and Satellite (ComNetSat), 2012 IEEE International Conference on
Conference_Location :
Bali
Print_ISBN :
978-1-4673-0888-5
DOI :
10.1109/ComNetSat.2012.6380797