Paper Title:
Impersonation Attack on RFID Authentication Protocol and its Countermeasures
  Abstract

Due to the well-developed technology and its variety of applications, the Radio Frequency Identifications (RFIDs) are widespread in a broad range of markets. In many applications, the RFID systems need security service such as authentication mechanism to identify tag and resist possible attacks. In 2008, Song et al. proposed a RFID authentication protocol for low-cost tags. Their protocol has the merits of privacy and security properties, and it can stand tag impersonation attack, replay attack, and backward/forward traceability. In this article, we show that their protocol cannot resist server impersonation attack as they declared. An adversary can successfully impersonate as a server to send fake message for verification. We also present countermeasures to fix the flaw. The performance of the improved mechanisms is the same as that of Song et al.’s protocol while the server impersonation attack is avoided.

  Info
Periodical
Key Engineering Materials (Volumes 467-469)
Edited by
Dehuai Zeng
Pages
1787-1792
DOI
10.4028/www.scientific.net/KEM.467-469.1787
Citation
Y. C. Lee, "Impersonation Attack on RFID Authentication Protocol and its Countermeasures", Key Engineering Materials, Vols. 467-469, pp. 1787-1792, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xin Mei Lu, Lei He
Abstract:It is necessary for researchers to design lightweight authentication protocols to protect information security between tag and reader in RFID...
2709
Authors: Yong Gan, Lei He, Tao Zhang, Na Na Li
Abstract:RFID has become an important infrastructure technology. However, it does not solve information security problem. An adversary can eavesdrop...
2262
Authors: Lei He, Yong Gan, Na Na Li, Tao Zhang
Abstract:Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide...
2267
Authors: Lin Tang, En Jian Bai, Wen Qiang Wu
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often...
1845
Authors: Qing Xuan Jia, Xin Wang, Xin Gao, Pan Pan Gao, Bing Zhao
Chapter 8: Software, Communication and Computer Applications in Industry and Engineering
Abstract:Due to the radio transmission nature of RFID, the challenge of security and privacy has seriously hindered the large-scale development of...
1966