Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, which allows a reader to identify objects in an authenticated manner. Recently, Liao and Hsiao proposed a very interesting elliptic curve cryptography-based RFID authentication scheme with ID-verifier transfer protocol. They claimed that the proposed protocol is secure against many attacks and satisfies essential security requirements of RFID systems. However, in this paper, we demonstrate that the protocol suffers from several attacks, in contrast to their original claims in the paper. Furthermore, we also propose a repaired version of the authentication protocol against identified attacks, and we provide formal security proofs.
Funding
Achieving security and privacy in radio frequency identification (RFID) with lightweight security technologies
Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2015). Vulnerabilities of an ECC-Based RFID authentication scheme. Security and Communication Networks, 8 (17), 3262-3270.