University of Wollongong
Browse

Vulnerabilities of an ECC-Based RFID authentication scheme

journal contribution
posted on 2024-11-16, 09:12 authored by Nan LiNan Li, Yi Mu, Willy SusiloWilly Susilo, Fuchun GuoFuchun Guo, Vijay Varadharajan
Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, which allows a reader to identify objects in an authenticated manner. Recently, Liao and Hsiao proposed a very interesting elliptic curve cryptography-based RFID authentication scheme with ID-verifier transfer protocol. They claimed that the proposed protocol is secure against many attacks and satisfies essential security requirements of RFID systems. However, in this paper, we demonstrate that the protocol suffers from several attacks, in contrast to their original claims in the paper. Furthermore, we also propose a repaired version of the authentication protocol against identified attacks, and we provide formal security proofs.

Funding

Achieving security and privacy in radio frequency identification (RFID) with lightweight security technologies

Australian Research Council

Find out more...

History

Citation

Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2015). Vulnerabilities of an ECC-Based RFID authentication scheme. Security and Communication Networks, 8 (17), 3262-3270.

Journal title

Security and Communication Networks

Volume

8

Issue

17

Pagination

3262-3270

Language

English

RIS ID

99656

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC