DocumentCode
3340392
Title
Analysis of RFID Mutual Authentication Protocols
Author
Guo, Charng Rang
Author_Institution
Defence Sci. & Technol. Agency, Infocomm Infrastruct. Programme Centre, Singapore
fYear
2009
fDate
5-8 April 2009
Firstpage
1
Lastpage
5
Abstract
In order to secure RFID transactions, an authentication scheme has originally been included as part of the "EPC Gen2" industrial standard. This scheme, however, has been found to have some weaknesses. To overcome such weaknesses, some authors have proposed new schemes to improve its security. Two of the latest proposals are the Lim-Li protocol and the Konidala-Kim-Kim protocol presented in 2007. We propose an attack that can be applied to both these protocols. In both cases, the search space for the password(s) used have been drastically reduced, which effectively breaks the security of these protocols.
Keywords
authorisation; message authentication; protocols; radiofrequency identification; EPC Gen2 industrial standard; Konidala-Kim-Kim protocol; Lim-Li protocol; RFID mutual authentication protocols; RFID transaction security; password; search space; Access protocols; Authentication; Communications Society; Data security; Databases; Proposals; Radiofrequency identification;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE
Conference_Location
Budapest
ISSN
1525-3511
Print_ISBN
978-1-4244-2947-9
Electronic_ISBN
1525-3511
Type
conf
DOI
10.1109/WCNC.2009.4917595
Filename
4917595
Link To Document