200 likes | 364 Views
Second ACM Conference on Wireless Network Security (WiSec ‘09). Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions. Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1. 1 Singapore Management University
E N D
Second ACM Conference on Wireless Network Security (WiSec ‘09) Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai1 Yingjiu Li1 Tieyan Li2 Robert H. Deng1 1Singapore Management University 2Institute for Infocomm Research (I2R) March 16-18, 2009, Zurich, Switzerland
Overall RFID Authentication Protocol for Low-Cost Tags B. Song and C. J. Mitchell (WiSec 08) Tag impersonation attack Song-Mitchell Protocol Server impersonation attack RFID Tag Ownership Transfer B. Song (RFIDsec 08) Song’s Secret Update Protocol De-synchronization attack
Outline • RFID Background • Attacks and Improvements to the Song–Mitchell Protocol • Attacks and Improvements to the Song’s Secret Update Protocol • Conclusions
Radio Frequency Identification System Components: Tag, Reader, Back-end database Characteristics: Wireless connection ( tag reader ) Limited capability of the tags Attacker Model: Active attacker 100 meters Tag Reader Backend Server Attacker
Privacy and Security Concerns of Mutual Authentication Protocol • Tag information privacy • Tag location privacy • Resistance to server\tag impersonation attack • Resistance to replay attack • Resistance to de-synchronization attack • Forward and backward security
Privacy Concerns of Ownership Transfer • New owner privacy • Old owner privacy • Authorization recovery
Song-Mitchell Mutual Authentication Protocol ti = h(si) Identification Implicit tag authentication Update Server authentication Update
Server Impersonation Attack r1 M1 , M2 M3 Em, you are valid. M1 , M3 I’m server r1’ Result ? M1’, M2’ M3’
Result of Server Impersonation Attack [(si,ti)new, (si,ti)old] Ti Server [t’] Search database, Search… Search…. But, r1 M1 , M2 It’s me, Ti…. I was changed by Attacker. Who are you?
Tag Impersonation Attack I’m server Ti r1’ M1’, M2’ Yeah, you are Ti. I’m tag Ti r1 Result ? M1, M2 M3
Vulnerability Analysis : >> : S >> l/2 = [S]R || [S]L
Song's secret update protocol ti ti’
De-Synchronization Attack Update Ti’s secret to ti’ Ti r1,M1, M2 Ti r1,M1’ , M2’ r2’, M3’ Updates to ti’’
Conclusions Song-Mitchell mutual authentication protocol Server impersonation attack Tag impersonation attack Tag secret update protocol De-synchronization attack
Discussion • Performance F denotes a computationally complex function such as hash and keyed hash, and k is an integer between 1 and 2N • Formal Proof Will be given in our future work.
Thank you! Shaoying Cai: sycai@smu.edu.sg