Algebraic Replay Attacks on Authentication in RFID Protocols

One of the most important challenges related to RFID systems is the verification of security proprieties in RFID authentication protocols. Among the important attacks in RFID systems, we speak about the Algebraic Replay Attack on Authentication (ARA). Common characteristic between the verified protocols cannot resist algebraic replay attacks. Our work is articulated on the formal automatic verification of RFID protocols by two different tools, firstly, the Open-source Fixedpoint Model Checker (OFMC) tool, secondary, the Constraint Logic based Attack Searcher (Cl-Atse) tool. These tools sufficient for detecting the attach of type ARA.

[1]  Hung-Yu Chien,et al.  A Lightweight RFID Protocol Using Substring , 2007, EUC.

[2]  M. Benmohammed,et al.  Vulnerabilities of two recently RFID authentication protocols , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).

[3]  Sasa Radomirovic,et al.  Algebraic Attacks on RFID Protocols , 2009, WISTP.

[4]  Kwangjo Kim,et al.  RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .

[5]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[6]  Gerhard P. Hancke Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[7]  Sasa Radomirovic,et al.  Attacks on RFID Protocols , 2008, IACR Cryptol. ePrint Arch..

[8]  Patel,et al.  Information Security: Theory and Practice , 2008 .

[9]  Tianjie Cao,et al.  Cryptanalysis of Two RFID Authentication Protocols , 2009, Int. J. Netw. Secur..

[10]  Ajitha Rajan,et al.  Requirements Coverage as an Adequacy Measure for Conformance Testing , 2008, ICFEM.

[11]  Philip Wadler Call-by-Value Is Dual to Call-by-Name - Reloaded , 2005, RTA.

[12]  Abolfazl Falahati,et al.  Cryptanalysis and enhancement of two low cost rfid authentication protocols , 2012, ArXiv.

[13]  Sebastian Mödersheim,et al.  OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.

[14]  Rajiv Laroia,et al.  A new paradigm for IP-based cellular networks , 2001 .

[15]  Yanfei Liu An Efficient RFID Authentication Protocol for Low-Cost Tags , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[16]  Zhan Yiju,et al.  A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.

[17]  Jun Pang,et al.  Improving Automatic Verification of Security Protocols with XOR , 2009, ICFEM.

[18]  Sebastian Mödersheim,et al.  The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols , 2009, FOSAD.

[19]  Sebastian Mödersheim,et al.  Algebraic Properties in Alice and Bob Notation , 2009, 2009 International Conference on Availability, Reliability and Security.

[20]  Mathieu Turuani,et al.  The CL-Atse Protocol Analyser , 2006, RTA.

[21]  Min-Shiang Hwang,et al.  A Mutual Authentication Protocol for RFID , 2011, IT Professional.