Loading…

Security analysis of the song-mitchell authentication protocol for low-cost RFID tags

In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to...

Full description

Saved in:
Bibliographic Details
Published in:IEEE communications letters 2009-04, Vol.13 (4), p.274-276
Main Authors: Rizomiliotis, P., Rekleitis, E., Gritzalis, S.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663
cites cdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663
container_end_page 276
container_issue 4
container_start_page 274
container_title IEEE communications letters
container_volume 13
creator Rizomiliotis, P.
Rekleitis, E.
Gritzalis, S.
description In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.
doi_str_mv 10.1109/LCOMM.2009.082117
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_34534765</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4815081</ieee_id><sourcerecordid>875026952</sourcerecordid><originalsourceid>FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</originalsourceid><addsrcrecordid>eNp9kUFPwyAUxxujiXP6AYwXYqKeOoFCgaOZTpdsWaLu3FBGN5auTKAx-_Yyu-zgwQuQx-_98_J-SXKN4AAhKB4nw9l0OsAQigHkGCF2kvQQpTzF8TiNb8hFypjg58mF92sII0VRL5l_aNU6E3ZANrLeeeOBrUBYaeBts0w3JqiVrmsg21hrglEyGNuArbPBKluDyjpQ2-9UWR_A-2j8DIJc-svkrJK111eHu5_MRy-fw7d0MnsdD58mqco4DWlWCQKlxopTXpJKoRLmShBCIVtAWCoiMC1LmgumccZLiRGWJa0W5ULqBc3zrJ88dLlxnq9W-1BsjFdxXtlo2_qCMwpxLiiO5P2_ZEZoRlhOI3j7B1zb1sXdxDTKCI5r20Oog5Sz3jtdFVtnNtLtCgSLvY_i10ex91F0PmLP3SFYeiXryslGGX9sxIgREa1E7qbjjNb6-E04opCj7AdzgpNv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>857428255</pqid></control><display><type>article</type><title>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</title><source>IEEE Xplore (Online service)</source><creator>Rizomiliotis, P. ; Rekleitis, E. ; Gritzalis, S.</creator><creatorcontrib>Rizomiliotis, P. ; Rekleitis, E. ; Gritzalis, S.</creatorcontrib><description>In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.</description><identifier>ISSN: 1089-7798</identifier><identifier>EISSN: 1558-2558</identifier><identifier>DOI: 10.1109/LCOMM.2009.082117</identifier><identifier>CODEN: ICLEF6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Access methods and protocols, osi model ; Access protocols ; Algorithm design and analysis ; Applied sciences ; Authentication ; Communication system security ; Computation ; Cryptographic protocols ; Cryptography ; Data security ; Exact sciences and technology ; Information, signal and communications theory ; Mathematical models ; Monitoring ; Privacy ; protocol ; Radio frequency identification ; Radiolocalization and radionavigation ; Readers ; RFID tags ; Security ; Servers ; Signal and communications theory ; Tags ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn</subject><ispartof>IEEE communications letters, 2009-04, Vol.13 (4), p.274-276</ispartof><rights>2009 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</citedby><cites>FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4815081$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=21749008$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Rizomiliotis, P.</creatorcontrib><creatorcontrib>Rekleitis, E.</creatorcontrib><creatorcontrib>Gritzalis, S.</creatorcontrib><title>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</title><title>IEEE communications letters</title><addtitle>COML</addtitle><description>In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.</description><subject>Access methods and protocols, osi model</subject><subject>Access protocols</subject><subject>Algorithm design and analysis</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Communication system security</subject><subject>Computation</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Data security</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Mathematical models</subject><subject>Monitoring</subject><subject>Privacy</subject><subject>protocol</subject><subject>Radio frequency identification</subject><subject>Radiolocalization and radionavigation</subject><subject>Readers</subject><subject>RFID tags</subject><subject>Security</subject><subject>Servers</subject><subject>Signal and communications theory</subject><subject>Tags</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><issn>1089-7798</issn><issn>1558-2558</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNp9kUFPwyAUxxujiXP6AYwXYqKeOoFCgaOZTpdsWaLu3FBGN5auTKAx-_Yyu-zgwQuQx-_98_J-SXKN4AAhKB4nw9l0OsAQigHkGCF2kvQQpTzF8TiNb8hFypjg58mF92sII0VRL5l_aNU6E3ZANrLeeeOBrUBYaeBts0w3JqiVrmsg21hrglEyGNuArbPBKluDyjpQ2-9UWR_A-2j8DIJc-svkrJK111eHu5_MRy-fw7d0MnsdD58mqco4DWlWCQKlxopTXpJKoRLmShBCIVtAWCoiMC1LmgumccZLiRGWJa0W5ULqBc3zrJ88dLlxnq9W-1BsjFdxXtlo2_qCMwpxLiiO5P2_ZEZoRlhOI3j7B1zb1sXdxDTKCI5r20Oog5Sz3jtdFVtnNtLtCgSLvY_i10ex91F0PmLP3SFYeiXryslGGX9sxIgREa1E7qbjjNb6-E04opCj7AdzgpNv</recordid><startdate>20090401</startdate><enddate>20090401</enddate><creator>Rizomiliotis, P.</creator><creator>Rekleitis, E.</creator><creator>Gritzalis, S.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20090401</creationdate><title>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</title><author>Rizomiliotis, P. ; Rekleitis, E. ; Gritzalis, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access methods and protocols, osi model</topic><topic>Access protocols</topic><topic>Algorithm design and analysis</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Communication system security</topic><topic>Computation</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Data security</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Mathematical models</topic><topic>Monitoring</topic><topic>Privacy</topic><topic>protocol</topic><topic>Radio frequency identification</topic><topic>Radiolocalization and radionavigation</topic><topic>Readers</topic><topic>RFID tags</topic><topic>Security</topic><topic>Servers</topic><topic>Signal and communications theory</topic><topic>Tags</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rizomiliotis, P.</creatorcontrib><creatorcontrib>Rekleitis, E.</creatorcontrib><creatorcontrib>Gritzalis, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rizomiliotis, P.</au><au>Rekleitis, E.</au><au>Gritzalis, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</atitle><jtitle>IEEE communications letters</jtitle><stitle>COML</stitle><date>2009-04-01</date><risdate>2009</risdate><volume>13</volume><issue>4</issue><spage>274</spage><epage>276</epage><pages>274-276</pages><issn>1089-7798</issn><eissn>1558-2558</eissn><coden>ICLEF6</coden><abstract>In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/LCOMM.2009.082117</doi><tpages>3</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1089-7798
ispartof IEEE communications letters, 2009-04, Vol.13 (4), p.274-276
issn 1089-7798
1558-2558
language eng
recordid cdi_proquest_miscellaneous_34534765
source IEEE Xplore (Online service)
subjects Access methods and protocols, osi model
Access protocols
Algorithm design and analysis
Applied sciences
Authentication
Communication system security
Computation
Cryptographic protocols
Cryptography
Data security
Exact sciences and technology
Information, signal and communications theory
Mathematical models
Monitoring
Privacy
protocol
Radio frequency identification
Radiolocalization and radionavigation
Readers
RFID tags
Security
Servers
Signal and communications theory
Tags
Telecommunications
Telecommunications and information theory
Teleprocessing networks. Isdn
title Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T00%3A04%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20analysis%20of%20the%20song-mitchell%20authentication%20protocol%20for%20low-cost%20RFID%20tags&rft.jtitle=IEEE%20communications%20letters&rft.au=Rizomiliotis,%20P.&rft.date=2009-04-01&rft.volume=13&rft.issue=4&rft.spage=274&rft.epage=276&rft.pages=274-276&rft.issn=1089-7798&rft.eissn=1558-2558&rft.coden=ICLEF6&rft_id=info:doi/10.1109/LCOMM.2009.082117&rft_dat=%3Cproquest_ieee_%3E875026952%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=857428255&rft_id=info:pmid/&rft_ieee_id=4815081&rfr_iscdi=true