2009
DOI: 10.1016/j.comcom.2009.03.010
|View full text |Cite
|
Sign up to set email alerts
|

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(28 citation statements)
references
References 6 publications
0
28
0
Order By: Relevance
“…It is much more difficult for an adversary to recover the access password under the correlation attack, or to forge a successful authentication under the dictionary attack. However, PerisLopez et al showed how the access password can be disclosed under the assumption of an active attacker [16]. In addition, Lim et al exposed that the correlation attack can be used against this scheme in a different way -to recover the kill password after eavesdropping over multiple authentication sessions [17].…”
Section: Related Workmentioning
confidence: 99%
“…It is much more difficult for an adversary to recover the access password under the correlation attack, or to forge a successful authentication under the dictionary attack. However, PerisLopez et al showed how the access password can be disclosed under the assumption of an active attacker [16]. In addition, Lim et al exposed that the correlation attack can be used against this scheme in a different way -to recover the kill password after eavesdropping over multiple authentication sessions [17].…”
Section: Related Workmentioning
confidence: 99%
“…Their protocol tried to apply CRC as cryptographic hash function for message authentication. However, CRC functions are linear and should not be used for any cryptographic purpose-only for detection of random errors in the channel [9]. So attacker is able to impersonate a tag or a reader, to trace a tag, and even to launch a DoS attack.…”
Section: Related Workmentioning
confidence: 99%
“…In 2007 Chien et al [8] proposed a mutual authentication protocol conforming to EPC-C1G2 standard, the security of their scheme heavily relied on the abuse of the cyclic redundancy code (CRC). However, Peris-Lopez et al [9]showed that the protocol cannot resist to tag impersonation, desynchronization attacking and location tracking. So the Chien et al's protocol not only is vulnerable to such attacks, but also does not provide tag privacy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although these protocols tried to provide secure and untraceable communication for RFID systems, however many weaknesses have been found in them [16,17,18,19,20,21]. In this context, Yeh et al have recently proposed a RFID mutual authentication protocol compatible with EPC C-1 G-2 standard [22] that we name SRP (Securing RFID Protocol) in this paper.…”
Section: Introductionmentioning
confidence: 99%