{"title":"A Lightweight Protocol Analysis and Modification for Secure RFID System","authors":"Hyun Seok Kim, Jin-Young Choi","doi":"10.1109/ICCCN.2008.ECP.177","DOIUrl":null,"url":null,"abstract":"A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important. In this paper, the RFID security protocols (HB++[first] and HB++[second]) presented in Bringer et al. are shown to be vulnerable to active attacks and a modified solution is presented. Some of the security violations that may occur and possible remedies that were provided in the literature are discussed. Finally, the modifications to HB++, a recent variant of HB is proposed.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2008.ECP.177","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important. In this paper, the RFID security protocols (HB++[first] and HB++[second]) presented in Bringer et al. are shown to be vulnerable to active attacks and a modified solution is presented. Some of the security violations that may occur and possible remedies that were provided in the literature are discussed. Finally, the modifications to HB++, a recent variant of HB is proposed.