DocumentCode :
2486850
Title :
Security Analysis of Some RFID Authentication Protocols
Author :
Wang Shaohui ; Wang Faxing
Author_Institution :
Coll. of Comput., Nanjing Univ. of Post & Telecommun., Nanjing, China
fYear :
2010
fDate :
22-23 May 2010
Firstpage :
1
Lastpage :
4
Abstract :
RFID-based systems are becoming a widely deployed pervasive technology that is more and more used in applications where privacy sensitive information is entrusted to RFID tags. A secure RFID system should provide untraceability (preventing unauthorized tag tracking) and authentication (preserving the confidentiality). In this paper, we give the security analysis of two type of recently proposed RFID authentication protocols, one assuming the tag can compute hash functions and the other utilizing anonymizer to provide anonymity. The analysis shows that the two protocols can not resist tracking attack and desynchronization attack.
Keywords :
message authentication; protocols; radiofrequency identification; telecommunication security; RFID authentication protocols; RFID tags; RFID-based system; anonymity; anonymizer; desynchronization attack; pervasive technology; privacy sensitive information; secure RFID system; security analysis; Authentication; Communication system security; Cryptographic protocols; Educational institutions; Information security; Privacy; RFID tags; Radiofrequency identification; Resists; Telecommunication computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5893-6
Electronic_ISBN :
978-1-4244-5895-0
Type :
conf
DOI :
10.1109/EBISS.2010.5473692
Filename :
5473692
Link To Document :
بازگشت