Security of an RFID Protocol for Supply Chains
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocols vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners.Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements,and point out flaws in the proofs of the security claims.
Ton van Deursen Sa(s)a Radomirovic
University of Luxembourg Department of Computer Science and Communications
国际会议
AiR08,EM2108,SOAIC08,SIOKM08,BIMA08,DKEEE08(2008IEEE国际电子商务工程学术会议)
西安
英文
568-573
2008-10-22(万方平台首次上网日期,不代表论文的发表时间)