Security of an RFID Protocol for Supply Chains

被引:10
|
作者
van Deursen, Ton [1 ]
Radomirovic, Sasa [1 ]
机构
[1] Univ Luxembourg, Dept Comp Sci & Commun, Luxembourg, Luxembourg
关键词
D O I
10.1109/ICEBE.2008.44
中图分类号
F [经济];
学科分类号
02 ;
摘要
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements, and point out flaws in the proofs of the security claims.
引用
收藏
页码:568 / 573
页数:6
相关论文
共 50 条
  • [1] RFID security issues in military supply chains
    Xiao, Qinghan
    Boulet, Cam
    Gibbons, Thomas
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 599 - +
  • [2] RFID-enabled Logistic Flow Tracing in Supply Chains: Communication, Protocol, and Security
    Zuo, Yanjun
    O'Keefe, Timothy
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [3] Universally composable Secure RFID communication protocol in supply chains
    Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China
    不详
    不详
    不详
    Jisuanji Xuebao, 2008, 10 (1754-1767):
  • [4] Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains
    Sidorov, Michail
    Ong, Ming Tze
    Sridharan, Ravivarma Vikneswaren
    Nakamura, Junya
    Ohmura, Ren
    Khor, Jing Huey
    IEEE ACCESS, 2019, 7 : 7273 - 7285
  • [5] A Lightweight Path Authentication Protocol for RFID-based Supply Chains
    Qian, Yuyin
    Zeng, Peng
    Shen, Zuming
    Choo, Kim-Kwang Raymond
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1297 - 1302
  • [6] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Muhammad Arslan Akram
    Adnan Noor Mian
    Wireless Personal Communications, 2022, 126 : 1881 - 1894
  • [7] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1881 - 1894
  • [8] Security and Privacy for Data Mining of RFID-Enabled Product Supply Chains
    Yao, Xiaoming
    Du, Wencai
    Zhou, Xiaoyi
    Ma, Jixin
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1037 - 1046
  • [9] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [10] Prediction of RFID Performance in Supply Chains
    Soon, Chin Boo
    Gutierrez, Jairo A.
    AMCIS 2010 PROCEEDINGS, 2010,