Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci Chin    2011, Vol. 5 Issue (3) : 335-340    https://doi.org/10.1007/s11704-011-0153-4
RESEARCH ARTICLE
Security analysis of two recently proposed RFID authentication protocols
Chao LV1(), Hui LI1, Jianfeng MA1, Meng ZHAO2
1. Key Laboratory of Computer Networks and Information Security, Xidian University, Xi’an 710071, China; 2. Department of Computer Science and Technology, Yanshan University, Qinhuangdao 066004, China
 Download: PDF(158 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification.

Keywords radio frequency identification (RFID) protocol      tag information leakage      untraceability attack     
Corresponding Author(s): LV Chao,Email:lyvchao@gmail.com   
Issue Date: 05 September 2011
 Cite this article:   
Chao LV,Hui LI,Jianfeng MA, et al. Security analysis of two recently proposed RFID authentication protocols[J]. Front Comput Sci Chin, 2011, 5(3): 335-340.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-011-0153-4
https://academic.hep.com.cn/fcs/EN/Y2011/V5/I3/335
Fig.1  RFID system architecture
SymbolMeaning
Sthe server (with access to the database)
Rthe reader
Tthe tag
ra random bit string
idtthe identifier of the tag
idrthe identifier of the reader
s, s'the common secret shared between the server and the tag
Ithe index value
C1, C2, Mthe temporal messages
h(·)hash function {0, 1}l → {0, 1}l
XOR operator
||the concatenation operator
Tab.1  Notations
Fig.2  Review of the protocol in []
Fig.3  Revision of the protocol in []
Fig.4  Review of the protocol in []
Fig.5  Revision of the LLPA protocol in []
1 Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications , 2006, 24(2): 381-394
doi: 10.1109/JSAC.2005.861395
2 Song B, Mitchell C J. RFID Authentication protocol for low-cost tags. In: Proceedings of 1st ACM Conference on Wireless Network Security . 2008, 140-147
3 Song B. RFID tag ownership transfer. In: Proceedings of 4th Workshop on RFID Security . 2008
4 van Deursen T, Radomirovi? S. Attacks on RFID protocols (version 1.1). Technical report , 2009
5 van Deursen T, Radomirovi? S. Security of an RFID protocol for supply chains. In: Proceedings of 1st Workshop on Advances in RFID . 2008, 568-573
6 van Deursen T, Mauw S, Radomirovi? S. Untraceability of RFID protocols. In: Proceedings of the 2nd IFIP WG 11.2 International Conference on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks . 2008, 1-15
7 van Deursen T, Mauw S, Radomirovi? S, Vullers P. Secure ownership and ownership transfer in RFID systems. In: Proceedings of 14th European Symposium on Research in Computer Security . 2009, 637-654
8 Yu T, Feng Q. A security RFID authentication protocol based on hash function. In: Proceedings of 2009 International Symposium on Information Engineering and Electronic Commerce . 2009, 804-807
9 Chen Y, Lu J, Chen S, Jan J. A low-cost RFID authentication protocol with location privacy protection. In: Proceedings of 5th International Conference on Information Assurance and Security . 2009, 109-113
doi: 10.1109/IAS.2009.77
10 Dolev D, Yao A. On the security of public-key protocols. IEEE Transactions on Information Theory , 1983, 29(2): 198-208
doi: 10.1109/TIT.1983.1056650
11 Thornton F, Haines B, Das A, Bhargava H, Campbell A. RFID Security. Rockland: Syngress, 2006
12 Berbain C, Billet O, Etrog J, Gilbert H. An efficient forward private RFID protocol. In: Proceedings of 16th ACM Conference on Computer and Communications Security . 2009, 43-53
doi: 10.1145/1653662.1653669
13 Vaudenay S. On privacy models for RFID. In: Proceedings of 13th International Conference on the Theory and Application of Cryptology and Information Security . 2007, 68-87
14 Juels A, Weis S. Defining strong privacy for RFID. In: Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops . 2007, 342-347
15 Paise R, Vaudenay S. Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security . 2008, 292-299
doi: 10.1145/1368310.1368352
16 Deng R, Li Y, Yung M, Zhao Y. A new framework for RFID privacy. In: Proceedings of 15th European Conference on Research in Computer Security . 2010, 1-18
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed