메뉴 건너뛰기




Volumn 7122 LNCS, Issue , 2012, Pages 90-103

On the security of mutual authentication protocols for RFID systems: The case of Wei et al 's protocol

Author keywords

Authentication; Desynchronization Attack; RFID; Tag Impersonation Attack

Indexed keywords

AUTHENTICATION; DATA PRIVACY; INTERNET OF THINGS; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 84903827490     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28879-1_7     Document Type: Conference Paper
Times cited : (3)

References (43)
  • 1
    • 33750018373 scopus 로고    scopus 로고
    • Shoehorning security into the EPC tag standard
    • De Prisco, R., Yung, M. (Eds.) Springer, Heidelberg
    • Bailey, D.V., Juels, A.: Shoehorning Security into the EPC Tag Standard. In: De Prisco, R., Yung, M. (Eds.) SCN 2006. LNCS, Vol. 4116, pp. 303-320. Springer, Heidelberg (2006)
    • (2006) SCN 2006. LNCS , vol.4116 , pp. 303-320
    • Bailey, D.V.1    Juels, A.2
  • 2
    • 49849085550 scopus 로고    scopus 로고
    • Springer, Heidelberg
    • Blundo, C., Cimato, S. (eds.): SCN 2004. LNCS, Vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
    • (2005) SCN 2004. LNCS , vol.3352 , pp. 149-164
    • Blundo, C.1    Cimato, S.2
  • 3
    • 78049323791 scopus 로고
    • Springer, Heidelberg
    • Brassard, G. (ed.): CRYPTO 1989. LNCS, Vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) CRYPTO 1989. LNCS , vol.435 , pp. 416-427
    • Brassard, G.1
  • 4
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
    • Chen, C.-L., Deng, Y.-Y.: Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Eng. Appl. of AI 22(8), 1284-1291 (2009)
    • (2009) Eng. Appl. of AI , vol.22 , Issue.8 , pp. 1284-1291
    • Chen, C.-L.1    Deng, Y.-Y.2
  • 5
    • 78751647681 scopus 로고    scopus 로고
    • The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
    • Chen, Y.-Y., Tsai, M.-L., Jan, J.-K.: The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Computer Communication 34(3), 250-256 (2011)
    • (2011) Computer Communication , vol.34 , Issue.3 , pp. 250-256
    • Chen, Y.-Y.1    Tsai, M.-L.2    Jan, J.-K.3
  • 6
    • 33751049043 scopus 로고    scopus 로고
    • Secure access control schemes for RFID systems with anonymity
    • IEEE Computer Society
    • Chien, H.-Y.: Secure Access Control Schemes for RFID Systems with Anonymity. In: MDM, page 96. IEEE Computer Society (2006)
    • (2006) MDM , pp. 96
    • Chien, H.-Y.1
  • 7
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces 29(2), 254-259 (2007)
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 8
    • 68949181328 scopus 로고    scopus 로고
    • Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems
    • Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems. Computer Standards & Interfaces 31(6), 1124-1130 (2009)
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1124-1130
    • Choi, E.Y.1    Lee, D.H.2    Lim, J.I.3
  • 9
    • 84903845345 scopus 로고    scopus 로고
    • Class-1 generation 2 UHF air interface protocol standard version 1.2.0, gen2
    • Class-1 generation 2 UHF air interface protocol standard version 1.2.0, Gen2. In: Gen-2 Standard. EPCGlobal (2008), http://www.epcglobalinc.org/ standards/
    • (2008) Gen-2 Standard
  • 10
    • 84981199109 scopus 로고    scopus 로고
    • A design principle for hash functions
    • Damgard, I.: A Design Principle for Hash Functions. In: Brassard [3], pp. 416-427
    • Brassard [3] , pp. 416-427
    • Damgard, I.1
  • 11
    • 84903838439 scopus 로고    scopus 로고
    • Yearly report on algorithms and keysizes, technical report D.SPA.13Rev.1.0, ICT-2007-216676
    • January 4 ECRYPT (2010)
    • EPC Tag data standar dversion (January 4, 2008); Yearly report on algorithms and keysizes, Technical Report D.SPA.13Rev.1.0, ICT-2007-216676. In: Gen2 Standard. ECRYPT (2010), http://www.epcglobalinc.org/standards/
    • (2008) Gen2 Standard
  • 12
    • 0003629990 scopus 로고    scopus 로고
    • FIPS National Institute for Standards and Technology (NIST) August
    • FIPS. Secure Hash Standard. National Institute for Standards and Technology (NIST) (August 2002)
    • (2002) Secure Hash Standard
  • 13
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Hung-Yu, C: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing 4(4), 337-340 (2007)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Hung-Yu, C.1
  • 15
    • 84873150044 scopus 로고    scopus 로고
    • RFID authentication protocol conforming to EPC class-1 generation-2 standard
    • Arabnia, H.R., Daimi, K. (Eds.) CSREA Press
    • Jin, G., Jeong, E.Y., Jung, H.-Y., Lee, K.D.: RFID authentication protocol conforming to EPC class-1 generation-2 standard. In: Arabnia, H.R., Daimi, K. (Eds.) Security and Management, pp. 227-231. CSREA Press (2009)
    • (2009) Security and Management , pp. 227-231
    • Jin, G.1    Jeong, E.Y.2    Jung, H.-Y.3    Lee, K.D.4
  • 16
    • 38149000154 scopus 로고    scopus 로고
    • An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
    • Denko, M.K., Shih, C.-s., Li, K.-C, Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (Eds.) Springer, Heidelberg
    • Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C, Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (Eds.) EUC-WS 2007. LNCS, Vol. 4809, pp. 43-56. Springer, Heidelberg (2007)
    • (2007) EUC-WS 2007. LNCS , vol.4809 , pp. 43-56
    • Lo, N.W.1    Yeh, K.-H.2
  • 17
    • 84937461306 scopus 로고    scopus 로고
    • One way hash functions and DES
    • Markle, R.: One way Hash Functions and DES. In: Brassard [3], pp. 428-446
    • Brassard [3] , pp. 428-446
    • Markle, R.1
  • 18
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Atluri, V., Pfitzmann, B., McDaniel, P.D. (Eds.) ACM
    • Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (Eds.) ACM Conference on Computer and Communications Security, pp. 210-219. ACM (2004)
    • (2004) ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 19
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology FIPS Publication 180 May
    • National Institute of Standards and Technology. Secure Hash Standard (SHS). FIPS Publication 180 (May 1993)
    • (1993) Secure Hash Standard (SHS)
  • 21
    • 65649112157 scopus 로고    scopus 로고
    • Security analysis of the song mitchell authentication protocol for low-cost RFID tags
    • Rizomiliotis, S.G.P., Rekleitis, E.: Security analysis of the Song Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters 13(4), 274-276 (2009)
    • (2009) IEEE Communications Letters , vol.13 , Issue.4 , pp. 274-276
    • Rizomiliotis, S.G.P.1    Rekleitis, E.2
  • 22
    • 33750067948 scopus 로고    scopus 로고
    • M AP: A minimalist mutual-authentication protocol for low-cost RFID tags
    • Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (Eds.) Springer, Heidelberg
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (Eds.) UIC 2006. LNCS, Vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
    • (2006) UIC 2006. LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 25
    • 79959978275 scopus 로고    scopus 로고
    • Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol
    • Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.E., van der Lubbe, J.C.A.: Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol. Eng. Appl. of AI 24(6), 1061-1069 (2011)
    • (2011) Eng. Appl. of AI , vol.24 , Issue.6 , pp. 1061-1069
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Tapiador, J.E.3    Van Der Lubbe, J.C.A.4
  • 26
    • 70450265312 scopus 로고    scopus 로고
    • Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
    • Phan, R.C.-W.: Cryptanalysis of a New Ultralightweight RFID Authentication Protocol - SASI. IEEE Transactions on Dependable and Secure Computing 6(4), 316-320 (2009)
    • (2009) IEEE Transactions on Dependable and Secure Computing , vol.6 , Issue.4 , pp. 316-320
    • Phan, R.C.-W.1
  • 27
    • 78650176848 scopus 로고    scopus 로고
    • RFID mutual authentication protocols
    • Piramuthu, S.: RFID mutual authentication protocols. Decision Support Systems 50(2), 387-393 (2011)
    • (2011) Decision Support Systems , vol.50 , Issue.2 , pp. 387-393
    • Piramuthu, S.1
  • 28
    • 2442450133 scopus 로고
    • RFC 1321: The MD5 message-digest algorithm
    • April
    • Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board (April 1992)
    • (1992) Internet Activities Board
    • Rivest, R.L.1
  • 29
    • 80455173519 scopus 로고    scopus 로고
    • Tag impersonation attack on two RFID mutual authentication protocols
    • Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., Chai, Q.: Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. In: FARES (2011)
    • (2011) FARES
    • Safkhani, M.1    Bagheri, N.2    Naderi, M.3    Luo, Y.4    Chai, Q.5
  • 32
    • 56749103027 scopus 로고    scopus 로고
    • RFID authentication protocol for low-cost tags
    • Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WiSec 2008, pp. 140-147 (2008)
    • (2008) WiSec 2008 , pp. 140-147
    • Song, B.1    Mitchell, C.J.2
  • 33
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Computer Communications 34(4), 556-566 (2011)
    • (2011) Computer Communications , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 34
    • 67649484364 scopus 로고    scopus 로고
    • A gen2-based RFID authentication protocol for security and privacy
    • Sun, H.-M., Ting, W.-C.: A Gen2-Based RFID Authentication Protocol for Security and Privacy. IEEE Transactions on Mobile Computing 8(8), 1052-1062 (2009)
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , Issue.8 , pp. 1052-1062
    • Sun, H.-M.1    Ting, W.-C.2
  • 35
    • 85008055668 scopus 로고    scopus 로고
    • Secure and serverless RFID authentication and search protocols
    • Tan, C.C., Sheng, B., Li, Q.: Secure and Serverless RFID Authentication and Search Protocols. IEEE Transactions on Wireless Communications 7(4), 1400-1407 (2008)
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.4 , pp. 1400-1407
    • Tan, C.C.1    Sheng, B.2    Li, Q.3
  • 36
    • 79953083437 scopus 로고    scopus 로고
    • A mutual authentication protocol for RFID
    • Wei, C.-H., Hwang, M.-S., Chin, A.Y.: A Mutual Authentication Protocol for RFID. IT Professional 13(2), 20-24 (2011)
    • (2011) IT Professional , vol.13 , Issue.2 , pp. 20-24
    • Wei, C.-H.1    Hwang, M.-S.2    Chin, A.Y.3
  • 38
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Hutter, D., Müller, G., Stephan, W., Ullmann, M. (Eds.) Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (Eds.) Security in Pervasive Computing 2003. LNCS, Vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
    • (2004) Security in Pervasive Computing 2003. LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 40
    • 74549147425 scopus 로고    scopus 로고
    • A light-weight mutual authentication protocol for ISO 18000-6B standard RFID system
    • Wu, W., Gu, Y.: A light-weight mutual authentication protocol for ISO 18000-6B standard RFID system. In: Proceedings of ICCTA 2009, pp. 21-25 (2009)
    • (2009) Proceedings of ICCTA 2009 , pp. 21-25
    • Wu, W.1    Gu, Y.2
  • 42
  • 43
    • 84903832031 scopus 로고    scopus 로고
    • Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
    • in press, corrected proof
    • Yoon, E.-J.: Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications (in press, corrected proof, 2011)
    • (2011) Expert Systems with Applications
    • Yoon, E.-J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.