Cryptanalysis of the LCSS RFID Authentication Protocol

被引:1
|
作者
Cao, Tianjie [1 ]
Shen, Peng [1 ]
Bertino, Elisa [2 ]
机构
[1] China Univ Min & Technol, Sch Comp, Xuzhou 221116, Peoples R China
[2] Purdue Univ, CERIAS, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ISECS.2008.73
中图分类号
F [经济];
学科分类号
02 ;
摘要
To reduce the computational load on both the back-end database and the tags, Ha et al. proposed a low-cost and strong-security (LCSS) RFID authentication protocol. In this paper, we identify two effective attacks, a desynchronization attack and a spoofing attack, against the LCSS protocol. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a legal tag to spoof the RFID reader by extracting the ID of a specific tag during the authentication process. Moreover, we point out the potential countermeasure by adding an integrity check to improve the security.
引用
收藏
页码:305 / +
页数:2
相关论文
共 50 条
  • [41] Analysis of an Improved RFID Authentication Protocol
    LI Heng GAO Fei XUE Yanming FENG ShuoBeijing Institute of TechnologyBeijing China
    微计算机信息, 2010, 26 (32) : 129 - 130+190
  • [42] Design and Analysis for RFID Authentication Protocol
    Zhang, Zhen
    Zhou, Shijie
    Luo, Zongwei
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 574 - +
  • [43] Lightweight Bidirectional Authentication Protocol for RFID
    He, Jiaqi
    Peng, Changgen
    Fu, Zhangjie
    Xu, Dequan
    Tang, Hanlin
    Computer Engineering and Applications, 2023, 59 (18) : 268 - 277
  • [44] A scalable and untraceable authentication protocol for RFID
    Seo, Youngjoon
    Lee, Hyunrok
    Kim, Kwangjo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 252 - 261
  • [45] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [46] RFID authentication protocol design methodology
    Cai, QingLing
    Zhan, Yiju
    Yang, Jian
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (02) : 91 - 103
  • [47] A Secure and Lightweight Authentication Protocol for RFID
    Liu Cheng
    Lin Shenwen
    Li Yingbo
    Li Na
    Wang Xuren
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 317 - 320
  • [48] Study on RFID Authentication Protocol Theory
    Qi Yong
    Yao Qingsong
    Chen Ying
    Zhong Xiao
    CHINA COMMUNICATIONS, 2011, 8 (01) : 65 - 71
  • [49] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243
  • [50] Research of an Improved RFID Authentication Protocol
    Yu, W. J.
    Zhang, Y. W.
    Tu, Z. Y.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 510 - 512