Two Security Problems of RFID Security Method with Ownership Transfer

  • Authors:
  • Eun-Jun Yoon;Kee-Young Yoo

  • Affiliations:
  • -;-

  • Venue:
  • NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem. Osaka et al. claimed that their proposed RFID security method achieves the following security requirements such as (1) Indistinguishability, (2) Forward Security, (3) Replay Attack, (4) Tag Killing, and (5) Ownership Transfer. Unlike their claims, the current paper points out two security problems of Osaka et al.'s RFID security method. To mitigate these security breaches, we propose an improved RFID security method.