Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Journal: The International Arab Journal of Information Technology (Vol.12, No. 4)Publication Date: 2015-07-01
Authors : Yousof Farzaneh; Mahdi Azizi; Masoud Dehkordi; Abdolrasoul Mirghadri;
Page : 340-346
Keywords : Low-cost RFID; cryptography; protocol; vulnerability.;
Abstract
Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for low-cost RFID tags with restricted computational power and memory space. Recently, Lee proposed two ultra lightweight authentication protocols for low-cost RFID tags, namely DIDRFID and SIDRFID protocols. The first protocol is based on dynamic identity and the second one on static identity. Lee claimed that his protocols can resist tracking, replay, impersonation and DOS attacks. In this paper, we show that Lee's protocols are not secure and they are vulnerable against tracking, impersonation, and full disclosure attacks. Specially, an adversary can accomplish an effective full disclosure attack on DIDRFID protocol by eavesdropping two consecutive sessions and gets all the secret information stored on a tag. Also, we demonstrate that an adversary with ability of obtaining secret information of a single compromised tag in SIDRFID protocol, can get the secret information of other tags and she/he can completely control the whole RFID system
Other Latest Articles
- VLSI Implementations of Compressive Image Acquisition using Block Based Compression Algorithm
- An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection
- Two Layer Defending Mechanism against DDoS Attacks
- Effects of Training Set Dimension on Recognition of Dysmorphic Faces with Statistical Classifiers
- Topical Web Crawling for Domain-Specific Resource Discovery Enhanced by Selectively using Link-Context
Last modified: 2019-11-14 22:49:55