Loading…
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to...
Saved in:
Published in: | IEEE communications letters 2009-04, Vol.13 (4), p.274-276 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663 |
---|---|
cites | cdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663 |
container_end_page | 276 |
container_issue | 4 |
container_start_page | 274 |
container_title | IEEE communications letters |
container_volume | 13 |
creator | Rizomiliotis, P. Rekleitis, E. Gritzalis, S. |
description | In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw. |
doi_str_mv | 10.1109/LCOMM.2009.082117 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_miscellaneous_34534765</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4815081</ieee_id><sourcerecordid>875026952</sourcerecordid><originalsourceid>FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</originalsourceid><addsrcrecordid>eNp9kUFPwyAUxxujiXP6AYwXYqKeOoFCgaOZTpdsWaLu3FBGN5auTKAx-_Yyu-zgwQuQx-_98_J-SXKN4AAhKB4nw9l0OsAQigHkGCF2kvQQpTzF8TiNb8hFypjg58mF92sII0VRL5l_aNU6E3ZANrLeeeOBrUBYaeBts0w3JqiVrmsg21hrglEyGNuArbPBKluDyjpQ2-9UWR_A-2j8DIJc-svkrJK111eHu5_MRy-fw7d0MnsdD58mqco4DWlWCQKlxopTXpJKoRLmShBCIVtAWCoiMC1LmgumccZLiRGWJa0W5ULqBc3zrJ88dLlxnq9W-1BsjFdxXtlo2_qCMwpxLiiO5P2_ZEZoRlhOI3j7B1zb1sXdxDTKCI5r20Oog5Sz3jtdFVtnNtLtCgSLvY_i10ex91F0PmLP3SFYeiXryslGGX9sxIgREa1E7qbjjNb6-E04opCj7AdzgpNv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>857428255</pqid></control><display><type>article</type><title>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</title><source>IEEE Xplore (Online service)</source><creator>Rizomiliotis, P. ; Rekleitis, E. ; Gritzalis, S.</creator><creatorcontrib>Rizomiliotis, P. ; Rekleitis, E. ; Gritzalis, S.</creatorcontrib><description>In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.</description><identifier>ISSN: 1089-7798</identifier><identifier>EISSN: 1558-2558</identifier><identifier>DOI: 10.1109/LCOMM.2009.082117</identifier><identifier>CODEN: ICLEF6</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Access methods and protocols, osi model ; Access protocols ; Algorithm design and analysis ; Applied sciences ; Authentication ; Communication system security ; Computation ; Cryptographic protocols ; Cryptography ; Data security ; Exact sciences and technology ; Information, signal and communications theory ; Mathematical models ; Monitoring ; Privacy ; protocol ; Radio frequency identification ; Radiolocalization and radionavigation ; Readers ; RFID tags ; Security ; Servers ; Signal and communications theory ; Tags ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn</subject><ispartof>IEEE communications letters, 2009-04, Vol.13 (4), p.274-276</ispartof><rights>2009 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</citedby><cites>FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4815081$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=21749008$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Rizomiliotis, P.</creatorcontrib><creatorcontrib>Rekleitis, E.</creatorcontrib><creatorcontrib>Gritzalis, S.</creatorcontrib><title>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</title><title>IEEE communications letters</title><addtitle>COML</addtitle><description>In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.</description><subject>Access methods and protocols, osi model</subject><subject>Access protocols</subject><subject>Algorithm design and analysis</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Communication system security</subject><subject>Computation</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Data security</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Mathematical models</subject><subject>Monitoring</subject><subject>Privacy</subject><subject>protocol</subject><subject>Radio frequency identification</subject><subject>Radiolocalization and radionavigation</subject><subject>Readers</subject><subject>RFID tags</subject><subject>Security</subject><subject>Servers</subject><subject>Signal and communications theory</subject><subject>Tags</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><issn>1089-7798</issn><issn>1558-2558</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><recordid>eNp9kUFPwyAUxxujiXP6AYwXYqKeOoFCgaOZTpdsWaLu3FBGN5auTKAx-_Yyu-zgwQuQx-_98_J-SXKN4AAhKB4nw9l0OsAQigHkGCF2kvQQpTzF8TiNb8hFypjg58mF92sII0VRL5l_aNU6E3ZANrLeeeOBrUBYaeBts0w3JqiVrmsg21hrglEyGNuArbPBKluDyjpQ2-9UWR_A-2j8DIJc-svkrJK111eHu5_MRy-fw7d0MnsdD58mqco4DWlWCQKlxopTXpJKoRLmShBCIVtAWCoiMC1LmgumccZLiRGWJa0W5ULqBc3zrJ88dLlxnq9W-1BsjFdxXtlo2_qCMwpxLiiO5P2_ZEZoRlhOI3j7B1zb1sXdxDTKCI5r20Oog5Sz3jtdFVtnNtLtCgSLvY_i10ex91F0PmLP3SFYeiXryslGGX9sxIgREa1E7qbjjNb6-E04opCj7AdzgpNv</recordid><startdate>20090401</startdate><enddate>20090401</enddate><creator>Rizomiliotis, P.</creator><creator>Rekleitis, E.</creator><creator>Gritzalis, S.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20090401</creationdate><title>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</title><author>Rizomiliotis, P. ; Rekleitis, E. ; Gritzalis, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access methods and protocols, osi model</topic><topic>Access protocols</topic><topic>Algorithm design and analysis</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Communication system security</topic><topic>Computation</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Data security</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Mathematical models</topic><topic>Monitoring</topic><topic>Privacy</topic><topic>protocol</topic><topic>Radio frequency identification</topic><topic>Radiolocalization and radionavigation</topic><topic>Readers</topic><topic>RFID tags</topic><topic>Security</topic><topic>Servers</topic><topic>Signal and communications theory</topic><topic>Tags</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rizomiliotis, P.</creatorcontrib><creatorcontrib>Rekleitis, E.</creatorcontrib><creatorcontrib>Gritzalis, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rizomiliotis, P.</au><au>Rekleitis, E.</au><au>Gritzalis, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security analysis of the song-mitchell authentication protocol for low-cost RFID tags</atitle><jtitle>IEEE communications letters</jtitle><stitle>COML</stitle><date>2009-04-01</date><risdate>2009</risdate><volume>13</volume><issue>4</issue><spage>274</spage><epage>276</epage><pages>274-276</pages><issn>1089-7798</issn><eissn>1558-2558</eissn><coden>ICLEF6</coden><abstract>In this paper, we describe an attack against one of the most efficient authentication protocols for low-cost RFID tags recently proposed by Song and Mitchell. A weak attacker, i.e. an attacker that has no access to the internal data of a tag, is able to impersonate a legitimate reader/server, and to desynchronize a tag. The attack is very efficient and has minimal computational complexity. Finally, we propose a simple solution to fix the flaw.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/LCOMM.2009.082117</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1089-7798 |
ispartof | IEEE communications letters, 2009-04, Vol.13 (4), p.274-276 |
issn | 1089-7798 1558-2558 |
language | eng |
recordid | cdi_proquest_miscellaneous_34534765 |
source | IEEE Xplore (Online service) |
subjects | Access methods and protocols, osi model Access protocols Algorithm design and analysis Applied sciences Authentication Communication system security Computation Cryptographic protocols Cryptography Data security Exact sciences and technology Information, signal and communications theory Mathematical models Monitoring Privacy protocol Radio frequency identification Radiolocalization and radionavigation Readers RFID tags Security Servers Signal and communications theory Tags Telecommunications Telecommunications and information theory Teleprocessing networks. Isdn |
title | Security analysis of the song-mitchell authentication protocol for low-cost RFID tags |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T00%3A04%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20analysis%20of%20the%20song-mitchell%20authentication%20protocol%20for%20low-cost%20RFID%20tags&rft.jtitle=IEEE%20communications%20letters&rft.au=Rizomiliotis,%20P.&rft.date=2009-04-01&rft.volume=13&rft.issue=4&rft.spage=274&rft.epage=276&rft.pages=274-276&rft.issn=1089-7798&rft.eissn=1558-2558&rft.coden=ICLEF6&rft_id=info:doi/10.1109/LCOMM.2009.082117&rft_dat=%3Cproquest_ieee_%3E875026952%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c385t-3f940ae2c858b4fc1b06c944507d00bc4925bb5697e238ba212ab5fdbdaed5663%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=857428255&rft_id=info:pmid/&rft_ieee_id=4815081&rfr_iscdi=true |