Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we analyze the security of the RFID authentication protocol proposed by Choi et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats considered in RFID systems. However, we show that the protocol is vulnerable to an impersonation attack. Moreover, an attacker is able to trace a tag by querying it twice, given the initial information from 2⌈log2(ℓ+1)⌉+ 1(≈ ℓ + 2) consecutive sessions and 2 - 2⌈log2(ℓ+1)⌉ (& 2(ℓ + 1)) consecutive queries, where ℓ is the length of secret values (in binary). © IFIP International Federation for Information Processing 2006.

Cite

CITATION STYLE

APA

Kwon, D., Han, D., Lee, J., & Yeom, Y. (2006). Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4097 LNCS, pp. 262–270). Springer Verlag. https://doi.org/10.1007/11807964_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free