ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX

被引:3
作者
Wang Shaohui [1 ,2 ]
Liu Sujuan [1 ]
机构
[1] Computer Science College, Nanjing University of Posts and Communications
[2] Network and Data Security Key Laboratory of Sichuan Province
关键词
Radio Frequency IDentification (RFID); Mutual authentication; Matrix-based; Imper- sonation attack; Privacy; Scalability;
D O I
暂无
中图分类号
TN929.5 [移动通信]; TP212.9 [传感器的应用];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ; 080202 ;
摘要
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 2 条
[1]   Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol [J].
Peris-Lopez, Pedro ;
Hernandez-Castro, Julio C. ;
Tapiador, Juan M. E. ;
van der Lubbe, Jan C. A. .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (06) :1061-1069
[2]   Securing RFID systems conforming to EPC Class 1 Generation 2 standard [J].
Yeh, Tzu-Chang ;
Wang, Yan-Jun ;
Kuo, Tsai-Chi ;
Wang, Sheng-Shih .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) :7678-7683