You can view the full text of this article for free using the link below.

Title: Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems

Authors: Chao Lv; Hui Li; Jianfeng Ma; Ben Niu

Addresses: Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an, China. ' Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an, China. ' Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an, China. ' Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an, China

Abstract: RFID systems have many security risks as an insecure wireless communication channel exists between tag and reader. Kulseng et al. have proposed several lightweight secure search protocols for low-cost systems: the basic protocol and the synchronisation-based protocol. To attack these two protocols successfully, the adversary needs to eavesdrop on the communication channel between reader and tag, and intercept and tamper with the exchanged messages. We show that the basic protocol cannot resist the tracking attack. The synchronisation-based protocol is vulnerable to the tracking attack and a kind of desynchronisation attack.

Keywords: RFID protocol; tracking attacks; desynchronisation attacks; radio frequency identification; vulnerability analysis; lightweight secure search protocols; security; low cost RFID.

DOI: 10.1504/IJRFITA.2012.044646

International Journal of Radio Frequency Identification Technology and Applications, 2012 Vol.4 No.1, pp.3 - 12

Received: 30 Oct 2010
Accepted: 13 Apr 2011

Published online: 20 Dec 2014 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article