Cryptology ePrint Archive: Report 2012/334

On the Traceability of Tags in SUAP RFID Authentication Protocols

Masoumeh Safkhani, Nasour Bagheri, Majid Naderi

Abstract: Widespread adoption of RFID technology in all aspects of our life mainly depends on the fixing the privacy concerns of this technology's customers. Using a tagged object should not lead to existence of the tracing possibility. This concern is a challenging issue that has motivated the researchers to propose several authentication protocols to fix the traceability problem in RFID systems and also provide other security requirements.

In this paper, we analyze the security of three authentication protocols which have recently been proposed by Morshed et al. Our security analysis clearly highlights important security pitfalls in these protocols which leads to their vulnerability against traceability. The complexity of the proposed attacks are only several runs of the protocols while the adversary's advantages to trace the tagged object are maximal.

Category / Keywords: cryptographic protocols / RFID, Ubiquitous, Mutual Authentication, Traceability.

Date: received 12 Jun 2012

Contact author: nbagheri at srttu edu,Na bagheri@gmail com

Available format(s): PDF | BibTeX Citation

Version: 20120622:193218 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]