Weaknesses in two recent lightweight RFID authentication protocols

  • Authors:
  • Pedro Peris-Lopez;Julio C. Hernandez-Castro;Juan M. E. Tapiador;Tieyan Li;Jan C. A. van der Lubbe

  • Affiliations:
  • Department of Information and Communication, Delft University of Technology;School of Computing, University of Portsmouth;Department of Computer Science, University of York;Institute for Infocomm Research, A*STAR Singapore;Department of Information and Communication, Delft University of Technology

  • Venue:
  • Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately. In this paper, we analyze two recent proposals in this research area. First, Mitra's scheme is scrutinized, revealing its vulnerability to cloning and traceability attacks, which are among the security objectives pursued in the protocol definition [1]. Later, we show how the protocol is vulnerable against a full disclosure attack after eavesdropping a small number of sessions. Then, we analyze a new EPC-friendly scheme conforming to EPC Class-1 Generation-2 specification (ISO/IEC 180006-C), introduced by Qingling and Yiju [2]. This proposal attempts to correct many of the well known security shortcomings of the standard, and even includes a BAN logic based formal security proof. However, notwithstanding this formal security analysis, we show that Qingling et al.'s protocol offers roughly the same security as the standard they try to improve, is vulnerable to tag and reader impersonation attacks, and allows tag traceability.