Sciweavers

JSW
2008

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols

13 years 4 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely de-synchronization attack and full-disclosure attack, against their protocols. The former permanently disables the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID reader. It can be carried out in just single round of interaction in the authentication protocols. The latter completely compromises a tag by extracting all the secret information stored in the tag. It is accomplished across several runs of the protocols. Moreover, we point out the potential countermeasures to improve the security of above protocols.
Tieyan Li, Guilin Wang, Robert H. Deng
Added 13 Dec 2010
Updated 13 Dec 2010
Type Journal
Year 2008
Where JSW
Authors Tieyan Li, Guilin Wang, Robert H. Deng
Comments (0)