The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID tags with restricted computational power and memory space. Recently, Lee proposed two ultra lightweight authentication protocols for low*cost RFID tags, namely DIDRFID an d SIDRFID protocols. The first protocol is based on dynamic identity and the second one on static identity. Lee claimed that his protocols can resist tracking, replay, impersonation and DOS attacks. In this paper, we show that Lee’s protocol s are not secure and they are vulnerable against tr acking, impersonation, and full disclosure attacks. Specially, an adversar y can accomplish an effective full disclosure attack on DIDRFID protocol by eavesdropping two consecutive sessions and gets all the secret information stored on a tag. Also, we demonstrate that an adversary with ability of obtaining secret informat ion of a single compromised tag in SIDRFID protocol , can get the secret information of other tags and she/he can completely control the whole RFID system.


[1] Barasz M., Boros B., Ligeti P., Loja K., and Nagy D., Breaking LMAP, in Proceedings of International Conference on RFID Security , Graz, Austria, pp. 69678, 2007.

[2] Chien H., SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, IEEE Transactions on Dependable and Secure Computing , vol. 4, no. 4, pp. 3376340, 2007. Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols 345

[3] D Arco P. and De A., On Ultralightweight RFID Authentication Protocols, IEEE Transactions on Dependable and Secure Computing , vol. 8, no. 4, pp. 5486563, 2011.

[4] David M. and Prasad N., Providing Strong Security and High Privacy in Low6Cost RFID Networks, in Proceedings of Security and Privacy in Mobile Information and Communication Systems , Turin, Italy, pp. 1726 179, 2009.

[5] European Commission Information Society web site., available at: http://ec.europa.eu/ informationciety/policy/rfid, last visited 2012.

[6] Han D. and Kwon D., Vulnerability of an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards, Computer Standards and Interfaces , vol. 31, no. 4, pp. 6486 652, 2009.

[7] Hernandez6Castro J., Peris6Lopez P., Phan R., Estevez6Tapiador M., and Ribagorda A., Cryptanalysis of the David6Prasad RFID Ultralightweight Authentication Protocol, in Proceedings of the 6 th International Workshop on Radio Frequency Identification: Security and Privacy Issues , Istanbul, Turkey, pp. 22634, 2010.

[8] Lee Y., Two Ultralightweight Authentication Protocols for Low6Cost RFID Tags, Applied Mathematics and Information Sciences , vol. 6, no. 2, pp. 4256431, 2012.

[9] Lee Y., Hsieh Y., You P., and Chen T., A New Ultralightweight RFID Protocol with Mutual Authentication, in Proceedings of WASE International Conference on Information Engineering , Shanxi, China, pp. 58661, 2009.

[10] Li T. and Wang G., Security Analysis of Two Ultra6Lightweight RFID Authentication Protocols, in Proceedings of the 22 nd IFIP TC*11 International Information Security Conference , Sandton, South Africa, pp. 1096120, 2007.

[11] Nasir M., Norman A., Fauzi S., and Azmi M., An RFID6Based Validation System for Halal Food, the International Arab Journal of Information Technology , vol. 8, no. 2, pp. 2046 211, 2011.

[12] Peris6Lopez P., Hernandez6Castro J., Estevez6 Tapiador M., and Ribagorda A., EMAP: An Efficient Mutual6Authentication Protocol for Low6Cost RFID Tags, available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi =10.1.1.69.7922&rep=rep1&type=pdf, last visited 2006.

[13] Peris6Lopez P., Hernandez6Castro J., Estevez6 Tapiador M., and Ribagorda A., LMAP: A Real Lightweight Mutual Authentication Protocol for Low6Cost RFID Tags, in Proceedings of the 2 nd Workshop RFID Security , Graz, Austria, pp. 1612, 2006.

[14] Peris6Lopez P., Hernandez6Castro J., Estevez6 Tapiador M., and Ribagorda A., M 2AP: A Minimalist Mutual6Authentication Protocol for Low6Cost RFID Tags, in Proceedings of International Conference on Ubiquitous Intelligence and Computing , Wuhan, China, pp. 9126923, 2006.

[15] Yeh T. and Wua C., Improvement of the RFID Authentication Scheme based on Quadratic Residues, Computer Communications , vol. 34, no. 3, pp. 3376341, 2011. Yousof Farzaneh received his MS degree in mathematics from Iran University of Science and Technology (IUST), Iran, in 2004. Currently, he is a PhD student in the School of Mathematics at Iran University of Science and Technology. His research interests include cryptography and network security. Mahdi Azizi received his MS and PhD degrees in communications, cryptology and information security from the IHU, Iran, in 2006 and 2012 respectively. His research interests include RFID security, authentication protocols and cryptanalysis. Masoud Dehkordi received his PhD degree in mathematics from Loughborough University, UK, in 1998. He is currently a professor of mathematics at the school of Mathematical Sciences in Iran University of Science and Technology (IUST), Iran. His research interests include number theory, cryptography and other relat ed topics. Abdolrasoul Mirghadri received his PhD degree in mathematical Statistics, from the faculty of Science, Shiraz University in 2001. He is an associate professor at the faculty and research center of communication and information technology, IHU, Iran since 1989. His research interest includes: Cryptography, statistics and stochastic processes. He is a member of ISC, ISS an d IMS.