A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags - Security and Privacy Protection in Information Processing Systems Access content directly
Conference Papers Year : 2013

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

Sarah Abughazalah
  • Function : Author
  • PersonId : 1001138
Keith Mayes
  • Function : Author
  • PersonId : 994013

Abstract

In this paper, we describe a vulnerability against one of the most efficient authentication protocols for low-cost RFID tags proposed by Song. The protocol defines a weak attacker as an intruder which can manipulate the communication between a reader and tag without accessing the internal data of a tag. It has been claimed that the Song protocol is able to resist weak attacks, such as denial of service (DoS) attack; however, we found that a weak attacker is able to desynchronise a tag, which is one kind of DoS attack. Moreover, the database in the Song protocol must use a brute force search to retrieve the tag’s records affecting the operational performance of the server. Finally, we propose an improved protocol which can prevent the security problems in Song protocol and enhance the server’s scalability performance.
Fichier principal
Vignette du fichier
978-3-642-39218-4_8_Chapter.pdf (222.89 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01463848 , version 1 (09-02-2017)

Licence

Attribution

Identifiers

Cite

Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes. A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.102-110, ⟨10.1007/978-3-642-39218-4_8⟩. ⟨hal-01463848⟩
242 View
116 Download

Altmetric

Share

Gmail Facebook X LinkedIn More