IEEE Transactions on Dependable and Secure Computing
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Towards lightweight secure communication protocols for passive RFIDs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Passive attacks on a class of authentication protocols for RFID
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Weaknesses in a recent ultra-lightweight RFID authentication protocol
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
Strong authentication and strong integrity (SASI) is not that strong
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Tree-based RFID authentication protocols are definitively not privacy-friendly
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*
Security and Communication Networks
Security and Privacy Analysis of Song---Mitchell RFID Authentication Protocol
Wireless Personal Communications: An International Journal
Improving the efficiency of RFID authentication with pre-computation
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
Hi-index | 0.00 |
In this paper, we analyze the security vulnerabilities of EMAP, an efficient RFID mutual authentication protocol recently proposed by Peris-Lopez et al. [15]. We present two effective attacks, a de-synchronization attack and a fulldisclosure attack, against the protocol. The former permanently disables the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID reader. The latter completely compromises a tag by extracting all the secret information stored in the tag. The de-synchronization attack can be carried out in just round of interaction in EMAP while the full-disclosure attack is accomplished across several runs of EMAP. We also discuss ways to counter the attacks.