DocumentCode :
3667667
Title :
Weaknesses of two RFID protocols regarding de-synchronization attacks
Author :
Mete Akgün;M. Ufuk Çağlayan
Author_Institution :
fYear :
2015
Firstpage :
828
Lastpage :
833
Abstract :
Radio Frequency Identification (RFID) protocols should have a secret updating phase in order to protect the privacy of RFID tags against tag tracing attacks. In the literature, there are many lightweight RFID authentication protocols that try to provide key updating with lightweight cryptographic primitives. In this paper, we analyze the security of two recently proposed lightweight RFID authentication protocol against desynchronization attacks. We show that secret values shared between the back-end server and any given tag can be easily desynchronized. This weakness stems from the insufficient design of these protocols.
Keywords :
"Protocols","Servers","Authentication","Privacy","RFID tags"
Publisher :
ieee
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International
Type :
conf
DOI :
10.1109/IWCMC.2015.7289190
Filename :
7289190
Link To Document :
بازگشت