Impersonation Attack on RFID Authentication Protocol and its Countermeasures

Abstract:

Article Preview

Due to the well-developed technology and its variety of applications, the Radio Frequency Identifications (RFIDs) are widespread in a broad range of markets. In many applications, the RFID systems need security service such as authentication mechanism to identify tag and resist possible attacks. In 2008, Song et al. proposed a RFID authentication protocol for low-cost tags. Their protocol has the merits of privacy and security properties, and it can stand tag impersonation attack, replay attack, and backward/forward traceability. In this article, we show that their protocol cannot resist server impersonation attack as they declared. An adversary can successfully impersonate as a server to send fake message for verification. We also present countermeasures to fix the flaw. The performance of the improved mechanisms is the same as that of Song et al.’s protocol while the server impersonation attack is avoided.

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Edited by:

Dehuai Zeng

Pages:

1787-1792

DOI:

10.4028/www.scientific.net/KEM.467-469.1787

Citation:

Y. C. Lee "Impersonation Attack on RFID Authentication Protocol and its Countermeasures", Key Engineering Materials, Vols. 467-469, pp. 1787-1792, 2011

Online since:

February 2011

Authors:

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.