Brief paper: Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol

  • Authors:
  • Gaurav Kapoor;Selwyn Piramuthu

  • Affiliations:
  • Information Systems and Operations Management, University of Florida, Gainesville, FL 32611-7169, USA;Information Systems and Operations Management, University of Florida, Gainesville, FL 32611-7169, USA and RFID European Lab, Paris, France

  • Venue:
  • Engineering Applications of Artificial Intelligence
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

As incorporation of RFID (Radio Frequency IDentification) tags in a wide variety of applications increase, there is a need to ensure the security and privacy of the entity to which these tags are attached. Not surprisingly, this is a very active area as attested by the large number of related published research literature. Recently, the journal engineering applications of artificial intelligence published a paper by Chen and Deng (2009) where the authors propose a mutual authentication protocol for RFID. This protocol has fundamental flaws that can be readily taken advantage by a resourceful adversary. We identify and discuss these vulnerabilities and point out the characteristics of this protocol that exposes it to these vulnerabilities.