2009
DOI: 10.1007/978-3-642-10838-9_4
|View full text |Cite
|
Sign up to set email alerts
|

When Compromised Readers Meet RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…, (c q , r q ) from the PUF of T and stores them together with ID in database DB, which is later used by verifier V in the authentication protocol. 4 Note that there are papers considering revocation of malicious verifiers (such as in [4,29]). A simple approach to enable verifier revocation in our scheme is moving all computations of V to DB s.t.…”
Section: Protocol Specificationmentioning
confidence: 99%
“…, (c q , r q ) from the PUF of T and stores them together with ID in database DB, which is later used by verifier V in the authentication protocol. 4 Note that there are papers considering revocation of malicious verifiers (such as in [4,29]). A simple approach to enable verifier revocation in our scheme is moving all computations of V to DB s.t.…”
Section: Protocol Specificationmentioning
confidence: 99%
“…We find that the W0 protocol suffers from tag tracking attack under an assumption of a compromised delegated reader scenario in [18]. The assumption is reasonable.…”
Section: Vulnerabilities In W2 Schemementioning
confidence: 87%
“…Indeed, due to these potential risks, the protocols usually use temporarily delegation model such that the delegated reader can identify the tags with a limited number of times and cannot update secrets of the tags. In 2009, Avoine et al introduced the problem of compromised readers [20] and pointed out the possibility and risk of such a situation. Throughout our attacks, we assume that the adversary can initiate communication with the delegated readers and the tags.…”
Section: Assumptions and The Attack Modelmentioning
confidence: 99%
“…In this paper, we firstly describe an architecture for a basic RFID delegation protocol and then analyze the security of a recent RFID delegation protocol, which we call SMD (Song Mitchell Delegation) due to name of the authors [15] under this model. We point out that the SMD protocol has security weakness under the assumption of a compromised reader scenario which was firstly addressed in [20] and show that the protocol suffers from a tag impersonation attack and a desynchronization attack. Next, we present a serious security flaw by which a delegated entity can still keep its delegation rights although they are ended by the back-end server and this makes the protocol susceptible to the mentioned attacks.…”
Section: Introductionmentioning
confidence: 99%