Konferans bildirisi Açık Erişim

Weaknesses of Two RFID Protocols Regarding De-synchronization Attacks

Akgun, Mete; Caglayan, M. Ufuk


DataCite XML

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/100763</identifier>
  <creators>
    <creator>
      <creatorName>Akgun, Mete</creatorName>
      <givenName>Mete</givenName>
      <familyName>Akgun</familyName>
      <affiliation>Tubitak UEKAE, TR-41470 Gebze, Kocaeli, Turkey</affiliation>
    </creator>
    <creator>
      <creatorName>Caglayan, M. Ufuk</creatorName>
      <givenName>M. Ufuk</givenName>
      <familyName>Caglayan</familyName>
      <affiliation>Bogazici Univ, Dept Comp Engn, Istanbul, Turkey</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Weaknesses Of Two Rfid Protocols Regarding De-Synchronization Attacks</title>
  </titles>
  <publisher>Aperta</publisher>
  <publicationYear>2015</publicationYear>
  <dates>
    <date dateType="Issued">2015-01-01</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/100763</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.81043/aperta.100762</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.81043/aperta.100763</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">Radio Frequency Identification (RFID) protocols should have a secret updating phase in order to protect the privacy of RFID tags against tag tracing attacks. In the literature, there are many lightweight RFID authentication protocols that try to provide key updating with lightweight cryptographic primitives. In this paper, we analyze the security of two recently proposed lightweight RFID authentication protocol against de-synchronization attacks. We show that secret values shared between the back-end server and any given tag can be easily desynchronized. This weakness stems from the insufficient design of these protocols.</description>
  </descriptions>
</resource>
19
6
görüntülenme
indirilme
Görüntülenme 19
İndirme 6
Veri hacmi 1.1 kB
Tekil görüntülenme 19
Tekil indirme 6

Alıntı yap