首页 | 本学科首页   官方微博 | 高级检索  
     


Security analysis of two recently proposed RFID authentication protocols
Authors:Chao Lv   Hui Li   Jianfeng Ma  Meng Zhao
Affiliation:(1) Department of Electrical Engineering, University of California, Los Angeles, CA, 90095-1594, USA;(2) Computing Science Department/DS group, Radboud University Nijmegen, 6525 Nijmegen, AJ, The Netherlands;(3) ESAT-COSIC, Katholieke Universiteit Leuven, Leuven, Belgium
Abstract:Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号