Title
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Abstract
Radio Frequency Identification (RFID), we show that three recently proposed RFID authentication protocols which rely exclusively on the used of Elliptic Curve Cryptography are not secure against the tracking attack. To make this attack successfully, the adversary needs to execute three phases. Firstly, the attacker just eavesdrops on the messages exchanged between Server and Tag. Secondly, the attacker impersonates Server to reply with the same random number that is obtained from previous phase. Finally, the adversary acts as a man in the middle to tamper the exchanged messages. Then, we propose enhancements and prove that the revisions are secure against the tracking attack that keep other security properties. Copyright (C) 2012 John Wiley & Sons, Ltd.
Year
DOI
Venue
2012
10.1002/ett.2514
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
Field
DocType
Volume
Man-in-the-middle attack,Computer science,Computer security,Vulnerability assessment,Computer network,Authentication protocol,Security properties,Adversary,Elliptic curve cryptography,Radio-frequency identification
Journal
23
Issue
ISSN
Citations 
7
2161-3915
12
PageRank 
References 
Authors
0.70
7
4
Name
Order
Citations
PageRank
Chao Lv17311.97
Hui Li210012.21
Jianfeng Ma334040.21
Yaoyu Zhang4331.40