DocumentCode :
3294741
Title :
Vulnerabilities of two recently RFID authentication protocols
Author :
Chikouche, N. ; Cherif, Farouk ; Benmohammed, M.
Author_Institution :
Dept. of Comput. Sci., Univ. of M´´sila, M´´sila, Algeria
fYear :
2012
fDate :
5-6 Nov. 2012
Firstpage :
1
Lastpage :
6
Abstract :
The communication channel between the tag and the reader in radiofrequency identification technology (RFID) is unsecured, which makes it opened to logical attacks on authentication protocol. In this paper, we analyze the security of two recently proposed RFID authentication protocols for mobile reader. Firstly, a protocol proposed by Wei et al. (2011) and the second proposed by Jialiang et al. (2012). Our work is focused on the automatic verification of secrecy and authentication properties of RFID protocols. For vulnerability analysis of these protocols, we will use AVISPA tools. The main cause of the detected attacks is the abuse of the xor-operator properties employed by the protocols.
Keywords :
protocols; radiofrequency identification; telecommunication channels; telecommunication security; AVISPA tools; RFID authentication protocols; authentication properties; automatic verification; communication channel; radiofrequency identification technology; secrecy; xor-operator properties; Authentication; Computer crime; Databases; Protocols; Radiofrequency identification; Servers; RFID; RFID tag authentication; authentication protocol; automatic verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Complex Systems (ICCS), 2012 International Conference on
Conference_Location :
Agadir
Print_ISBN :
978-1-4673-4764-8
Type :
conf
DOI :
10.1109/ICoCS.2012.6458584
Filename :
6458584
Link To Document :
بازگشت