On the Security of Two RFID Mutual Authentication Protocols
Aghili, Seyed Farhad, Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) On the Security of Two RFID Mutual Authentication Protocols. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 86-99.
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al.  and the second one by Huang, Lin and Li . We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Book Chapter|
|Keywords:||Systems and Data Security, Data Encryption, e-Commerce/e-business, EPC Class-1 Generation-2, PadGen function, RFID|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2013 Springer-Verlag Berlin Heidelberg|
|Deposited On:||05 Feb 2015 01:15|
|Last Modified:||11 Feb 2016 15:14|
Repository Staff Only: item control page