scispace - formally typeset
Book ChapterDOI

On the Security of Two RFID Mutual Authentication Protocols

Reads0
Chats0
TLDR
Huang et al. as discussed by the authors investigated the security of two RFID mutual authentication protocols and showed that these two protocols have several weaknesses, such as passive adversary can determine the 32-bit secret password with a probability of 2.2.
Abstract
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of \(2^{-2}\), and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of \(1-2^{-4}\) and an active adversary can determine all 32 bits of Access password with success probability of \(2^{-4}\). The computational complexity of these attacks is negligible.

read more

Citations
More filters
Journal Article

Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce.

TL;DR: This paper shows that the proposed ultra‐lightweight RFID authentication scheme for m‐commerce (ULRAS) protocol is vulnerable to secret disclosure and reader impersonation attacks, and improves it to a protocol that is resistant to these attacks.
Book

RFID Security and Privacy

TL;DR: A systematic overview on RFID security and privacy is provided at both the physical and network level, which means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFIDs should be identify without disclosure of any valuable information about the devices.
Journal ArticleDOI

Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs

TL;DR: It is proved that the Caballero-Gil et al. scheme to present a new RFID authentication protocol, entitled CG+, is vulnerable to de-synchronization attack and suffers from the information leakage with a complexity of about 216 offline PRNG evaluations which is completely affordable by a conventional adversary.
Proceedings ArticleDOI

On secure outsourcing of cryptographic computations to cloud

TL;DR: In this paper, the authors present the problem of secure outsourcing of cryptographic computations with RFID technology as the use case together with their ideas, where applicable, that can provide a direction towards solving the problems.
References
More filters
Journal ArticleDOI

An introduction to RFID technology

TL;DR: The author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this technology.
Journal ArticleDOI

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards

TL;DR: This paper will point out the weaknesses of two EPC Class 1 GEN-2-conformed security protocols, and then proposes a new protocol, which raises the security level and conforms to the EPC class 1 Gen-2 standards.
Journal ArticleDOI

Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

TL;DR: This paper proposes a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers and proves its feasibility for use in several applications.
Proceedings Article

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme

TL;DR: This scheme utilizes the tag’s Access and Kill Passwords and achieves the following three goals: detect cloned fake tags, ward off malicious snooping readers, and in the process, a manufacturer can also implicitly keep track on the whereabouts of its genuine products.
Proceedings ArticleDOI

RFID privacy: relation between two notions, minimal condition, and efficient construction

TL;DR: It is shown that if an RFID system has strong (or weak) unp-privacy then the computational power of anRFID tag can be used to construct a pseudorandom function family provided that theRFID system is complete and sound, and a new RFID protocol is proposed to satisfy the minimal requirement.
Related Papers (5)