Cryptanalysis of the LCSS RFID Authentication Protocol

被引:1
|
作者
Cao, Tianjie [1 ]
Shen, Peng [1 ]
Bertino, Elisa [2 ]
机构
[1] China Univ Min & Technol, Sch Comp, Xuzhou 221116, Peoples R China
[2] Purdue Univ, CERIAS, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ISECS.2008.73
中图分类号
F [经济];
学科分类号
02 ;
摘要
To reduce the computational load on both the back-end database and the tags, Ha et al. proposed a low-cost and strong-security (LCSS) RFID authentication protocol. In this paper, we identify two effective attacks, a desynchronization attack and a spoofing attack, against the LCSS protocol. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a legal tag to spoof the RFID reader by extracting the ID of a specific tag during the authentication process. Moreover, we point out the potential countermeasure by adding an integrity check to improve the security.
引用
收藏
页码:305 / +
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of a group RFID authentication protocol
    Nasrollah Pakniat
    Ziba Eslami
    Wireless Networks, 2020, 26 : 3363 - 3372
  • [2] Cryptanalysis and improvement of a group RFID authentication protocol
    Pakniat, Nasrollah
    Eslami, Ziba
    WIRELESS NETWORKS, 2020, 26 (05) : 3363 - 3372
  • [3] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 138 (04) : 2613 - 2635
  • [4] Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol
    Li, Jing
    Zhou, Zhiping
    Wang, Ping
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 7292 - 7297
  • [5] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [6] Cryptanalysis and Improvement of a Novel RFID Authentication Protocol for Medical Systems
    Xiao, Feng
    Hu, Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2025, 19 (02): : 589 - 611
  • [7] Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
    Abyaneh, Mohammad Reza Sohizadeh
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 92 - 103
  • [8] Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Phan, Raphael C. -W.
    Tapiador, Juan M. E.
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 22 - +
  • [9] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Da-Zhi Sun
    Ji-Dong Zhong
    Wireless Personal Communications, 2016, 91 : 1085 - 1093
  • [10] Formal Cryptanalysis of a CRC-Based RFID Authentication Protocol
    Sohrabi-Bonab, Zahra
    Alagheband, Mahdi R.
    Aref, Mohammad Reza
    2014 22ND IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2014, : 1642 - 1647