On the traceability of tags in SUAP RFID authentication protocols
Paper i proceeding, 2012

RFID technology is one of the most pervasive computing technologies with important advantages and a wide range of applications. Nevertheless, the widespread adoption of RFID technology mainly depends on fixing the security and privacy concerns of this technology. Using a tagged object should not lead to the traceability of this object. This concern is a challenging issue that has motivated the proposal of several authentication protocols that attempted to fix the traceability problem. In this paper, we analyze the security of three authentication protocols that have been recently proposed by Morshed et al. [2]. Our security analysis clearly highlights important security pitfalls in these protocols that lead to their vulnerability against traceability. The proposed attacks require only several runs of the protocols while the adversary's advantages to trace the tagged object are maximal. © 2012 IEEE.

traceability attack

RFID systems

Författare

M. Safkhani

N. Bagheri

P. Peris-Lopez

Aikaterini Mitrokotsa

Chalmers, Data- och informationsteknik, Nätverk och system

2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012

292-296

Styrkeområden

Informations- och kommunikationsteknik

Ämneskategorier

Data- och informationsvetenskap

DOI

10.1109/RFID-TA.2012.6404532