Cryptanalysis and enhancement of two low cost RFID authentication protocols

H Jannati, A Falahati - arXiv preprint arXiv:1202.1971, 2012 - arxiv.org
arXiv preprint arXiv:1202.1971, 2012arxiv.org
Widespread attention is recently paid upon RFID system structure considering its ease of
deployment over an extensive range of applications. Due to its several advantages, many
technical articles are published to improve its capabilities over specific system
implementations. Recently, a lightweight anti-de-synchronization RFID authentication
protocol and a lightweight binding proof protocol to guard patient safety are proposed. This
contribution provides enough evidence to prove the first introduced protocol vulnerability to …
Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight anti-de-synchronization RFID authentication protocol and a lightweight binding proof protocol to guard patient safety are proposed. This contribution provides enough evidence to prove the first introduced protocol vulnerability to de-synchronization attack. It also provides the other protocol's suffering from de-synchronization attack as well as tracking the movements of the tags. This paper also addresses appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.
arxiv.org
以上显示的是最相近的搜索结果。 查看全部搜索结果