Title :
Security Analysis of Some Recent Authentication Protocols for RFID
Author :
Niu, Ben ; Li, Hui ; Zhu, Xiaoyan ; Lv, Chao
Author_Institution :
Key Lab. of Comput. Networks & Inf. Security, Xidian Univ., Xi´´an, China
Abstract :
Radio frequency identification technology has been increasingly used in many applications. However, there are many threats and security risks in the RFID systems since an insecure wireless channel exists between the reader and the tags. The security of RFID protocols must be designed and proved with careful cryptanalysis. In this paper, we analyze some RFID authentication protocols proposed recently. Firstly, Shen et al. propose an authentication protocol with strong privacy and security, but we prove that the attacker is able to impersonate a reader to desynchronize a tag by eavesdropping on and modifying the messages transmitted. Secondly, WeiHWang et al. claim that their hash function based protocol can resist from several attacks including denial of service attack, but we perform this attack by inducing a desynchronization of secret between server and tags. At last, Sandhya and Rangaswarmy propose an authentication protocol with many security features, while we present desynchronization attack and reader impersonation attack on this protocol.
Keywords :
cryptographic protocols; radiofrequency identification; telecommunication security; wireless channels; RFID authentication protocols; cryptanalysis; desynchronization attack; hash function based protocol; reader impersonation attack; security analysis; wireless channel; Authentication; Conferences; Cryptography; Protocols; Radiofrequency identification; Servers; Authentication Protocol; RFID; Security;
Conference_Titel :
Computational Intelligence and Security (CIS), 2011 Seventh International Conference on
Conference_Location :
Hainan
Print_ISBN :
978-1-4577-2008-6
DOI :
10.1109/CIS.2011.152