Skip to main content

2014 | OriginalPaper | Buchkapitel

Weakness in a Serverless Authentication Protocol for Radio Frequency Identification

verfasst von : Miaolei Deng, Weidong Yang, Weijun Zhu

Erschienen in: Mechatronics and Automatic Control Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The design of secure authentication protocols for radio frequency identification (RFID) system is still a quite challenging problem. Many authentication protocols for RFID have been proposed, but most have weaknesses or flaws. We analyze the security of a serverless RFID authentication protocol which recently been presented by Hoque et al. The protocol was expected to safeguard both RFID tag and RFID reader against major attacks, and RFID server is not needed in the protocol. However, our security analysis shows that the authentication protocol is vulnerable to attack of data desynchronization. This attack destroys the availability of the protocol. Furthermore, improvement to overcome the security vulnerability of the protocol was presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chai Q (2012) Design and analysis of security schemes for low-cost RFID systems[D]. Doctor dissertation of Waterloo University, Waterloo Chai Q (2012) Design and analysis of security schemes for low-cost RFID systems[D]. Doctor dissertation of Waterloo University, Waterloo
2.
Zurück zum Zitat Jules A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394CrossRef Jules A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394CrossRef
3.
Zurück zum Zitat Lee YK, Batina L, Singele D (2010) Low-cost untraceable authentication protocols for RFID systems[C]. In: Proceedings of the 3rd ACM conference on wireless network security, ACM Press, New Jersey, pp 55–64 Lee YK, Batina L, Singele D (2010) Low-cost untraceable authentication protocols for RFID systems[C]. In: Proceedings of the 3rd ACM conference on wireless network security, ACM Press, New Jersey, pp 55–64
4.
Zurück zum Zitat Deng Miaolei, Ma Jianfeng, Zhou Lihua (2009) Design of anonymous authentication protocol for RFID. J Commun. 30(6):24–31 (in Chinese) Deng Miaolei, Ma Jianfeng, Zhou Lihua (2009) Design of anonymous authentication protocol for RFID. J Commun. 30(6):24–31 (in Chinese)
5.
Zurück zum Zitat Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):272–286CrossRef Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):272–286CrossRef
6.
Zurück zum Zitat Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):1196–1211CrossRef Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):1196–1211CrossRef
7.
Zurück zum Zitat Tan CC, Sheng B, Li Q (2007) Serverless search and authentication protocols for RFID[C]. In: Proceedings of the 5th annual IEEE international conference on pervasive computing and communications, IEEE Press, New York, pp 34–41 Tan CC, Sheng B, Li Q (2007) Serverless search and authentication protocols for RFID[C]. In: Proceedings of the 5th annual IEEE international conference on pervasive computing and communications, IEEE Press, New York, pp 34–41
8.
Zurück zum Zitat Ahamed SI, Rahman F, Hoque E (2008) S3PR: secure serverless search protocols for RFID[C]. In: International conference on information security and assurance, IEEE Press, Busan, pp 187–192 Ahamed SI, Rahman F, Hoque E (2008) S3PR: secure serverless search protocols for RFID[C]. In: International conference on information security and assurance, IEEE Press, Busan, pp 187–192
9.
Zurück zum Zitat Deng Miaolei, Wang Yulei, Qiu Gang et al (2009) Authentication protocol for RFID without back-end database. J Beijing Univ Posts Telecommun 32(2):68–71 (in Chinese) Deng Miaolei, Wang Yulei, Qiu Gang et al (2009) Authentication protocol for RFID without back-end database. J Beijing Univ Posts Telecommun 32(2):68–71 (in Chinese)
10.
Zurück zum Zitat Hoque ME, Rahman F, Ahamed SI et al (2010) Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wirel Pers Commun 55:65–79CrossRef Hoque ME, Rahman F, Ahamed SI et al (2010) Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wirel Pers Commun 55:65–79CrossRef
Metadaten
Titel
Weakness in a Serverless Authentication Protocol for Radio Frequency Identification
verfasst von
Miaolei Deng
Weidong Yang
Weijun Zhu
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-01273-5_119