Publication Type

Journal Article

Version

submittedVersion

Publication Date

2010

Abstract

In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, tag location tracking, and forward traceability. Moreover, the secret update protocol is not immune to de-synchronization attacks.

Keywords

Security protocols, Authentication, Ownership transfer, RFID

Discipline

Information Security

Research Areas

Information Security and Trust

Publication

Computer Networks

Volume

54

Issue

9

First Page

1502

Last Page

1508

ISSN

1389-1286

Identifier

10.1016/j.comnet.2009.11.007

Publisher

Elsevier

Additional URL

http://dx.doi.org/10.1016/j.comnet.2009.11.007

Share

COinS