Title | ||
---|---|---|
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. |
Abstract | ||
---|---|---|
Radio Frequency Identification (RFID), we show that three recently proposed RFID authentication protocols which rely exclusively on the used of Elliptic Curve Cryptography are not secure against the tracking attack. To make this attack successfully, the adversary needs to execute three phases. Firstly, the attacker just eavesdrops on the messages exchanged between Server and Tag. Secondly, the attacker impersonates Server to reply with the same random number that is obtained from previous phase. Finally, the adversary acts as a man in the middle to tamper the exchanged messages. Then, we propose enhancements and prove that the revisions are secure against the tracking attack that keep other security properties. Copyright (C) 2012 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1002/ett.2514 | TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES |
Field | DocType | Volume |
Man-in-the-middle attack,Computer science,Computer security,Vulnerability assessment,Computer network,Authentication protocol,Security properties,Adversary,Elliptic curve cryptography,Radio-frequency identification | Journal | 23 |
Issue | ISSN | Citations |
7 | 2161-3915 | 12 |
PageRank | References | Authors |
0.70 | 7 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chao Lv | 1 | 73 | 11.97 |
Hui Li | 2 | 100 | 12.21 |
Jianfeng Ma | 3 | 340 | 40.21 |
Yaoyu Zhang | 4 | 33 | 1.40 |