Abstract
RFID tag search system can be used to find a particular tag among numerous tags. In 2011, Chun et al. proposed an RFID tag search protocol preserving privacy of mobile reader holders. Chun et al. claimed that their proposed protocol can withstand five attacks to be considered in serverless search protocols, such as tracking, cloning, eavesdropping, physical, and Denial of Service (DoS) attacks. However, this paper points out that the Chun et al.’s protocol still can be vulnerable to the DoS attack.
Chapter PDF
Similar content being viewed by others
References
Radio Frequency Identification(RFID).: A focus on information security and privacy. OECDWorking Party on Information Security and Privacy, DSTI/ICCP/REG (2007)9/ FINAL, 70 (2008)
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)
Feldhofer, M., Wolkerstorfer, J.: Strong crypto for RFID tags-a comparison of low-power hardware implementations. In: Proc. 2007 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1839–1842 (2007)
Tan, C., Sheng, B., Li, Q.: Secure and serverless RFID authentication and search protocols. IEEE Trans. Wireless Commun. 7(4), 1400–1407 (2008)
Ahamed, S.I., Rahman, F., Hoque, E., Kawsar, F., Nakajima, T.: 3PR: secure server-less search protocols for RFID. In: Proc. 2nd International Conference on Information Security and Assurance (ISA), pp. 187–192 (2008)
Ahamed, S.I., Rahman, F., Hoque, E., Kawsar, F., Nakajima, T.: Secure and efficient tag searching in RFID systems using serverless search protocol. Int. J. Security and Its Applications 2(4), 57–66 (2008)
Won, T.Y., Chun, J.Y., Lee, D.H.: Strong authentication protocol for secure RFID tag search without help of central database. In: Proc. 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), pp. 153–158 (2008)
Hoque, M.E., Rahman, F., Ahamed, S.I., Park, J.H.: Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wireless Personal Communications 55(1), 65–79 (2009)
Chun, L.J., Hwang, J.Y., Lee, D.H.: RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electronics Express 8(2), 50–56 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yoon, EJ. (2012). Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. In: Park, J.J., Zomaya, A., Yeo, SS., Sahni, S. (eds) Network and Parallel Computing. NPC 2012. Lecture Notes in Computer Science, vol 7513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35606-3_68
Download citation
DOI: https://doi.org/10.1007/978-3-642-35606-3_68
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35605-6
Online ISBN: 978-3-642-35606-3
eBook Packages: Computer ScienceComputer Science (R0)