A vulnerability in the song authentication protocol for low-cost RFID tags

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we describe a vulnerability against one of the most efficient authentication protocols for low-cost RFID tags proposed by Song. The protocol defines a weak attacker as an intruder which can manipulate the communication between a reader and tag without accessing the internal data of a tag. It has been claimed that the Song protocol is able to resist weak attacks, such as denial of service (DoS) attack; however, we found that a weak attacker is able to desynchronise a tag, which is one kind of DoS attack. Moreover, the database in the Song protocol must use a brute force search to retrieve the tag’s records affecting the operational performance of the server. Finally, we propose an improved protocol which can prevent the security problems in Song protocol and enhance the server’s scalability performance.

Cite

CITATION STYLE

APA

Abughazalah, S., Markantonakis, K., & Mayes, K. (2013). A vulnerability in the song authentication protocol for low-cost RFID tags. In IFIP Advances in Information and Communication Technology (Vol. 405, pp. 102–110). Springer New York LLC. https://doi.org/10.1007/978-3-642-39218-4_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free