New Security Problem in RFID Systems “Tag Killing”
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as “Tag Killing” which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with “Tag Killing” adversary model and we show that most of them have weaknesses and are vulnerable to it.
KeywordsRadio frequency identification (RFID) privacy security hash chain challenge-response
Unable to display preview. Download preview PDF.
- 1.Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049. Referenced (2005), http://eprint.iacr.org
- 12.mCloak: Personal corporate management of wireless devices and technology, Product description (2003), www.mobilecloak.com
- 13.Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Communications and Computer Security, pp. 210–219. ACM Press, New York (2004)Google Scholar
- 14.Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, USA (2003)Google Scholar
- 22.Yeo, S.S., Kim, S.K.: Scalable and Flexible Privacy Protection Scheme for RFID Systems. In: 2nd European Workshop on Security in Ad-Hoc and Sensor Networks, ESAS 2005 (2005) (to be appeared)Google Scholar