PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Vulnerability analysis of RFID protocols for tag ownership transfer
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Study on Secure RFID Mutual Authentication Scheme
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
An authentication protocol for low-cost RFID tags
International Journal of Mobile Communications
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
EMAP: An efficient mutual authentication protocol for passive RFID tags
International Journal of Automation and Computing
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*
Security and Communication Networks
A new framework for privacy of RFID path authentication
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
An Ownership Transfer Scheme Using Mobile RFIDs
Wireless Personal Communications: An International Journal
Security and Privacy Analysis of Song---Mitchell RFID Authentication Protocol
Wireless Personal Communications: An International Journal
RFID security in the context of "internet of things"
Proceedings of the First International Conference on Security of Internet of Things
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
Journal of Network and Computer Applications
Hi-index | 0.00 |
In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.