Vulnerability analysis of RFID protocols for tag ownership transfer

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Li, Tieyan and Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (Access to this publication is restricted)

PDF
Restricted to Repository staff only
Contact us about this Publication Download (484kB)
[img]
Official URL
http://dx.doi.org/10.1016/j.comnet.2009.11.007

Abstract

n RFIDSec'08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec'08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, tag location tracking, and forward traceability. Moreover, the secret update protocol is not immune to de-synchronization attacks.

Item Type: Article
Uncontrolled keywords: Authentication; Ownership transfer; RFID; Security protocols
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science
Divisions: Faculties > Science Technology and Medical Studies > School of Computing > Security Group
Depositing User: Julio Hernandez-Castro
Date Deposited: 24 Oct 2012 12:53
Last Modified: 18 Mar 2013 15:02
Resource URI: http://kar.kent.ac.uk/id/eprint/31945 (The current URI for this page, for reference purposes)
  • Depositors only (login required):

Downloads

Downloads per month over past year