Vulnerabilities of RFID protocols proposed in ISF

被引:11
作者
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
关键词
RFID; Cryptography; Protocol; AUTHENTICATION;
D O I
10.1007/s10796-010-9291-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not surprisingly, this continues to be a very active area for research and development. Recently, the Information Systems Frontiers Journal published two papers dealing with RFID authentication protocols. The protocols introduced in these papers, however, are vulnerable to attacks from an active adversary. We identify some existing vulnerabilities in these authentication protocols.
引用
收藏
页码:647 / 651
页数:5
相关论文
共 3 条
[1]   Protocols for RFID tag/reader authentication [J].
Piramuthu, Selwyn .
DECISION SUPPORT SYSTEMS, 2007, 43 (03) :897-914
[2]  
Totty M, 2009, WALL STREET J 0602
[3]   A lightweight anti-desynchronization RFID authentication protocol [J].
Zhou, Shijie ;
Zhang, Zhen ;
Luo, Zongwei ;
Wong, Edward C. .
INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) :521-528