Title :
Security Analysis of Some RFID Authentication Protocols
Author :
Wang Shaohui ; Wang Faxing
Author_Institution :
Coll. of Comput., Nanjing Univ. of Post & Telecommun., Nanjing, China
Abstract :
RFID-based systems are becoming a widely deployed pervasive technology that is more and more used in applications where privacy sensitive information is entrusted to RFID tags. A secure RFID system should provide untraceability (preventing unauthorized tag tracking) and authentication (preserving the confidentiality). In this paper, we give the security analysis of two type of recently proposed RFID authentication protocols, one assuming the tag can compute hash functions and the other utilizing anonymizer to provide anonymity. The analysis shows that the two protocols can not resist tracking attack and desynchronization attack.
Keywords :
message authentication; protocols; radiofrequency identification; telecommunication security; RFID authentication protocols; RFID tags; RFID-based system; anonymity; anonymizer; desynchronization attack; pervasive technology; privacy sensitive information; secure RFID system; security analysis; Authentication; Communication system security; Cryptographic protocols; Educational institutions; Information security; Privacy; RFID tags; Radiofrequency identification; Resists; Telecommunication computing;
Conference_Titel :
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5893-6
Electronic_ISBN :
978-1-4244-5895-0
DOI :
10.1109/EBISS.2010.5473692