Vulnerabilities of an ECC-Based RFID authentication scheme
RIS ID
99656
Abstract
Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, which allows a reader to identify objects in an authenticated manner. Recently, Liao and Hsiao proposed a very interesting elliptic curve cryptography-based RFID authentication scheme with ID-verifier transfer protocol. They claimed that the proposed protocol is secure against many attacks and satisfies essential security requirements of RFID systems. However, in this paper, we demonstrate that the protocol suffers from several attacks, in contrast to their original claims in the paper. Furthermore, we also propose a repaired version of the authentication protocol against identified attacks, and we provide formal security proofs.
Grant Number
ARC/DP110101951
Publication Details
Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2015). Vulnerabilities of an ECC-Based RFID authentication scheme. Security and Communication Networks, 8 (17), 3262-3270.