TITLE:
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
AUTHORS:
Zhicai Shi, Shitao Ren, Fei Wu, Changzhi Wang
KEYWORDS:
RFID, Authentication Protocol, Vulnerability, Hash Function, Security and Privacy
JOURNAL NAME:
Journal of Computer and Communications,
Vol.4 No.8,
June
17,
2016
ABSTRACT: The low-cost RFID tags have very limited
computing and storage resources and this makes it difficult to completely solve
their security and privacy problems. Lightweight authentication is considered
as one of the most effective methods to ensure the security in the RFID system.
Many light-weight authentication protocols use Hash function and pseudorandom
generator to ensure the anonymity and confidential communication of the RFID
system. But these protocols do not providesuch security as they claimed.
By analyzing some typical Hash-based RFID authentication protocols, it is found
that they are vulnerable to some common attacks. Many protocols cannot resist
tracing attack and de-synchronization attack. Some protocols cannot provide
forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based
authentication protocol and they claimed their protocol could resist the
well-known attacks. But by constructing some different attack scenarios, their
protocol is shown to be vulnerable to tracing attack and de-synchronization
attack. Based on the analysis for the Hash-based authentication protocols, some
feasible suggestions are proposed to improve the security of the RFID
authentication protocols.