Title :
Server Impersonation Attacks on RFID Protocols
Author_Institution :
Inf. Security Group R. Holloway, Univ. of London Egham, Egham
fDate :
Sept. 29 2008-Oct. 4 2008
Abstract :
We introduce server impersonation attacks, a practical security threat to RFID security protocols that has not previously been described. RFID tag memory is generally not tamper-proof for cost reasons. We show that, if a tag is compromised, such attacks can give rise to desynchronisation between server and tag in a number of existing RFID authentication protocols. We also describe possible countermeasures to this novel class of attacks.
Keywords :
cryptographic protocols; radiofrequency identification; RFID security protocols; authentication protocols; security threat; server impersonation attacks; Access protocols; Authentication; Costs; Cryptography; Electronic countermeasures; Information security; Mobile computing; RFID tags; Radiofrequency identification; Ubiquitous computing; RFID Authentication Protocols; Server Impersontation Attakcs; Traceability;
Conference_Titel :
Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. UBICOMM '08. The Second International Conference on
Conference_Location :
Valencia
Print_ISBN :
978-0-7695-3367-4
Electronic_ISBN :
978-0-7695-3367-4
DOI :
10.1109/UBICOMM.2008.55