Advertisement

Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader

  • Eun-Jun Yoon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7513)

Abstract

RFID tag search system can be used to find a particular tag among numerous tags. In 2011, Chun et al. proposed an RFID tag search protocol preserving privacy of mobile reader holders. Chun et al. claimed that their proposed protocol can withstand five attacks to be considered in serverless search protocols, such as tracking, cloning, eavesdropping, physical, and Denial of Service (DoS) attacks. However, this paper points out that the Chun et al.’s protocol still can be vulnerable to the DoS attack.

Keywords

RFID Privacy DoS attack Serverless search Passive tag 

References

  1. 1.
    Radio Frequency Identification(RFID).: A focus on information security and privacy. OECDWorking Party on Information Security and Privacy, DSTI/ICCP/REG (2007)9/ FINAL, 70 (2008) Google Scholar
  2. 2.
    Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Feldhofer, M., Wolkerstorfer, J.: Strong crypto for RFID tags-a comparison of low-power hardware implementations. In: Proc. 2007 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1839–1842 (2007)Google Scholar
  4. 4.
    Tan, C., Sheng, B., Li, Q.: Secure and serverless RFID authentication and search protocols. IEEE Trans. Wireless Commun. 7(4), 1400–1407 (2008)CrossRefGoogle Scholar
  5. 5.
    Ahamed, S.I., Rahman, F., Hoque, E., Kawsar, F., Nakajima, T.: 3PR: secure server-less search protocols for RFID. In: Proc. 2nd International Conference on Information Security and Assurance (ISA), pp. 187–192 (2008)Google Scholar
  6. 6.
    Ahamed, S.I., Rahman, F., Hoque, E., Kawsar, F., Nakajima, T.: Secure and efficient tag searching in RFID systems using serverless search protocol. Int. J. Security and Its Applications 2(4), 57–66 (2008)Google Scholar
  7. 7.
    Won, T.Y., Chun, J.Y., Lee, D.H.: Strong authentication protocol for secure RFID tag search without help of central database. In: Proc. 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), pp. 153–158 (2008)Google Scholar
  8. 8.
    Hoque, M.E., Rahman, F., Ahamed, S.I., Park, J.H.: Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wireless Personal Communications 55(1), 65–79 (2009)CrossRefGoogle Scholar
  9. 9.
    Chun, L.J., Hwang, J.Y., Lee, D.H.: RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electronics Express 8(2), 50–56 (2011)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Eun-Jun Yoon
    • 1
  1. 1.Department of Cyber SecurityKyungil UniversityKyungsan-SiRepublic of Korea

Personalised recommendations