@inproceedings{ccc23dd921974408a9359a3c999006af,
title = "De-synchronization attack on RFID authentication protocols",
abstract = "In order to protect privacy of RFID tag against malicious tag tracing activities, many RFID authentication protocols with the secret key update scheme have been proposed to support forward security. These proposals are symmetric key based in common due to the lack of computational resource to perform heavy asymmetric cryptographic operations in low-cost tags. In this paper, we have demonstrated that four RFID authentication protocols are vulnerable to a de-synchronization attack. The secret values shared between any given tag and the backend server can easily be de-synchronized through a series of attack process (or incomplete protocol runs). Our results indicate that these four schemes are naturally limited by their essential design and more rigorous security analyses are accordingly required. In addition, any extension from these four protocols may incur the insecurity owing to the same underlying protocol design.",
keywords = "Authentication, De-synchronization attack, Privacy, RFID, Security",
author = "Lo, {N. W.} and Yeh, {Kuo Hui}",
year = "2010",
doi = "10.1109/ISITA.2010.5649726",
language = "English",
isbn = "9781424460175",
series = "ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications",
pages = "566--570",
booktitle = "ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications",
note = "2010 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010 ; Conference date: 17-10-2010 Through 20-10-2010",
}