Abstract
The development of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy issues in great detail. Among other security characteristic of an RFID authentication protocol, untraceability and synchronization are the most important attributes. The former is strongly related to the privacy of tags and their holders, while the latter has a significant role in the security and availability parameters. In this paper, we investigate three RFID authentication protocols proposed by Duc and Kim, Song and Mitchell, and Cho, Yeo and Kim in terms of privacy and security. We analyze the protocol proposed by Duc and Kim and present desynchronization and traceability attacks. By initiating traceability, backward traceability and desynchronization attacks, we show that the protocol proposed by Song and Mitchell lacks location privacy and availability. In addition, we study the weaknesses in Cho et al.’s protocol and address its defects by applying desynchronization, traceability and backward traceability attacks. We also propose revisions to secure the Cho et al.’s protocol against the cited attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alomair, B., Lazos, L., Poovendran, R.: Passive Attacks on a Class of Authentication Protocols for RFID. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 102–115. Springer, Heidelberg (2007)
Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049 (2005), http://eprint.iacr.org/2005/049
Avoine, G.: Cryptography in radio frequency identification and fair ex-change protocols. Phd Thesis no. 3407, EPFL (2005), http://library.epfl.ch/theses/?nr=3407
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)
Banks, J., Pachano, M., Thompson, L., Hanny, D.: RFID Applied. John Wiley & Sons, Inc., Hoboken (2007)
Burmester, M., Van Le, T., De Medeiros, B., Tsudik, G.: Universally composable RFID identification and authentication protocols. ACM Transactions on Information and Systems Security 12(4) (Article 21) (2009)
Burmester, M., van Le, T., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proc. of ASIACCS, pp. 242–252. ACM Press, New York (2007)
Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications 34(3), 391–397 (2011)
Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A New Framework for RFID Privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010)
Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of SecureComm 2005, pp. 59–66 (2005)
Duc, D.N., Kim, K.: Defending RFID authentication protocols against DoS attacks. Computer Communications 34(3), 384–390 (2011)
Gilbert, H., Robshaw, M., Sibert, H.: An active attack against HB + -A provably secure lightweight authentication protocol. Cryptology ePrint Archive, http://eprint.iacr.org/2005/23.pdf
Ha, J., Moon, S.-J., Zhou, J., Ha, J.C.: A New Formal Proof Model for RFID Location Privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267–281. Springer, Heidelberg (2008)
Hernandez-Castro, J.C., Peris-Lopez, P., Phan, R.C.-W., Tapiador, J.M.E.: Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 22–34. Springer, Heidelberg (2010)
ISO/IEC 17799: Information technology-security techniques-code of practice for information security management. International Organization for Standardization (2005)
Juels, A.: Strengthening EPC tags against cloning. In: The Proceedings of WiSe 2005 (2005)
Juels, A., Weis, S.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137 (2006), http://eprint.iacr.org/2006/137
Li, L., Deng, R.H.: Vulnerability analysis of EMAP-An efficient RFID mutual authentication protocol. In: AReS 2007: Second International Conference on Availability, Reliability and Security (2007)
Li, T., Wang, G., Deng, R.H.: Security analysis on a family of ultra-lightweight RFID authentication protocols. Journal of Software 3(3), 1–10 (2008)
Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1–20. Springer, Heidelberg (2006)
Ma, C., Li, Y., Deng, R., Li, T.: RFID privacy: Relation between two notions, minimal condition, and efficient construction. In: ACM CCS (2009)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Information Systems Frontiers - ISF 12(5), 491–505 (2010)
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 321–336. Springer, Heidelberg (2009)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205. Springer, Heidelberg (2004)
Ouafi, K., Phan, R.C.-W.: Privacy of Recent RFID Authentication Protocols. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 263–277. Springer, Heidelberg (2008)
Ouafi, K., Phan, R.C.-W.: Traceable Privacy of Recent Provably-Secure RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 479–489. Springer, Heidelberg (2008)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks 54(9), 1502–1508 (2010)
Phan, R.C.-W., Wu, J., Ouafi, K., Stinson, D.R.: Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications 54(2) (2010), doi:10.1007/s11277-010-0001-0
Rizomiliotis, P., Rekleitis, E., Gritzalis, S.: Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters 13(4), 274–276 (2009)
Song, B.: RFID tag ownership transfer. In: Proceedings of Workshop on RFID Security (RFIDsec 2008), Budapest, Hungary (2008)
Song, B., Mitchell, C.J.: RFID authentication protocol for low-cost tags. In: Gligor, V.D., Hubaux, J., Poovendran, R. (eds.) ACM Conference on Wireless Network Security, WiSec 2008, pp. 140–147. ACM Press, USA (2008)
Song, B., Mitchell, C.J.: Scalable RFID pseudonym protocol. In: Proceedings of the Third International Conference on Network and System Security, NSS 2009, pp. 216–224. IEEE Computer Society (2009)
Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Computer Communications 34(4), 556–566 (2011)
Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of PerCom 2006, pp. 640–643 (2006)
van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID Protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1–15. Springer, Heidelberg (2008)
van Deursen, T., Radomirović, S.: Algebraic Attacks on RFID Protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 38–51. Springer, Heidelberg (2009)
van Deursen, T., Radomirovic, S.: Attacks on RFID protocols. Cryptology ePrint archive, Report 2008/310 (2008), http://eprint.iacr.org/2008/310
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Habibi, M.H., Aref, M.R., Ma, D. (2011). Addressing Flaws in RFID Authentication Protocols. In: Bernstein, D.J., Chatterjee, S. (eds) Progress in Cryptology – INDOCRYPT 2011. INDOCRYPT 2011. Lecture Notes in Computer Science, vol 7107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25578-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-25578-6_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25577-9
Online ISBN: 978-3-642-25578-6
eBook Packages: Computer ScienceComputer Science (R0)