The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol
It is very challenging on designing cryptographically strong security functions that can be incorporated into lowcost radio frequency identification (RFID) tags. Some RFID authentication protocols were proposed using only ultra-lightweight primitives, while the security of them must be scrutinized before being put forth into any real application. In this paper, we present two effective attacks, namely de-snchronization attack and full-disclosure attack, against an efficient ultra-lightweight RFID mutual authentication protocol: LMAP , which is recently proposed by Peris-Lopez et al. These active attacks are so serious as they cannot only disable the authentication capability of an RFID tag by destroying synchronization between the tag and the RFID reader, but also disclose all secret values stored in the tag. We point out the design flaws of the protocol and based on that, we improve the protocol with a stateful variant (SLMAP). The improved protocol is more secure in sense of tag anonymity, man-in-the-middle (MITM) resistance, and forgery prevention as shown in our analysis, and is more compact due to reduced operations and memory usage on implementing such a tag.
RFID authentication, security and privacy, ultra-lightweight primitives
Information Security and Trust
Journal of Security and Communication Networks
LI, Tieyan; DENG, Robert H.; and WANG, Guilin.
The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol. (2008). Journal of Security and Communication Networks. 1, (2), 135-146. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/740