File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/CISIS.2009.113
- Scopus: eid_2-s2.0-70349755536
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: RFID forward secure authentication protocol: Flaw and solution
Title | RFID forward secure authentication protocol: Flaw and solution |
---|---|
Authors | |
Issue Date | 2009 |
Citation | The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009), in conjunction with 3rd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2009). In Proceedings Of The International Conference On Complex, Intelligent And Software Intensive Systems, Cisis 2009, 2009, p. 627-632 How to Cite? |
Abstract | RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to the ubiquitous nature of RFID, attackers can easily launch attacks over wireless channel whenever there is a flaw on the RFID authentication protocol being used. A successful attack can imply a substantial loss in the enterprise and may trigger a series of problems. In this paper, we investigate a useful type of RFID authentication protocol, called forward secure authentication schemes, and found that these schemes are not secure. In particular, we present attacks that can desynchronize the authentication key of the RFID server and the tag so that they loss the ability to communicate or identify each other. On= the other hand, we propose a solution to overcome this attack. We also provide a formal proof to show that our solution is secure under this attack based on the Universally Composable Model. © 2009 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/61157 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, KY | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.date.accessioned | 2010-07-13T03:32:10Z | - |
dc.date.available | 2010-07-13T03:32:10Z | - |
dc.date.issued | 2009 | en_HK |
dc.identifier.citation | The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009), in conjunction with 3rd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2009). In Proceedings Of The International Conference On Complex, Intelligent And Software Intensive Systems, Cisis 2009, 2009, p. 627-632 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/61157 | - |
dc.description.abstract | RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to the ubiquitous nature of RFID, attackers can easily launch attacks over wireless channel whenever there is a flaw on the RFID authentication protocol being used. A successful attack can imply a substantial loss in the enterprise and may trigger a series of problems. In this paper, we investigate a useful type of RFID authentication protocol, called forward secure authentication schemes, and found that these schemes are not secure. In particular, we present attacks that can desynchronize the authentication key of the RFID server and the tag so that they loss the ability to communicate or identify each other. On= the other hand, we propose a solution to overcome this attack. We also provide a formal proof to show that our solution is secure under this attack based on the Universally Composable Model. © 2009 IEEE. | en_HK |
dc.language | eng | en_HK |
dc.relation.ispartof | Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009 | en_HK |
dc.title | RFID forward secure authentication protocol: Flaw and solution | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/CISIS.2009.113 | en_HK |
dc.identifier.scopus | eid_2-s2.0-70349755536 | en_HK |
dc.identifier.hkuros | 167074 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-70349755536&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 627 | en_HK |
dc.identifier.epage | 632 | en_HK |
dc.identifier.scopusauthorid | Yu, KY=14920139600 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |