Vulnerability Analysis of Elliptic Curve-Based RFID Protocol
Martinez et al. have proposed a secure RFID protocol recently which relies exclusively on the use of Elliptic Curve Cryptography (ECC) com-bined with a zero knowledge-based authentication scheme. In this paper, we show that this proposed protocol is not secure against the tracking attack. To make the attack successful, the adversary needs to execute three phases. Firstly, the attacker just eavesdrops on the messages exchanged be-tween Reader and Tag. Secondly, the attacker im-personates the Reader to replay the message which is obtained from the first phase. Finally, the adversary acts as a man in the middle to tamper the messages exchanged between Reader and Tag. Then we propose an enhancement and prove that the revision is secure against the tracking attack while keeping other security properties.
RFID authentication protocol ECC tracking attack
Lv Chao Li Hui Ma Jianfeng Niu Ben
School of Telecommunications Engineering,Xidian University, Xian 710071, Shaanxi Province, P.R. China
国际会议
2011年中国计算机学会服务计算学术会议(CCF NCSC2011)
济南
英文
153-158
2011-08-18(万方平台首次上网日期,不代表论文的发表时间)