2011
DOI: 10.1007/978-3-642-21040-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

Abstract: Abstract. Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we show that the proposed protocol does not have cited security features properly. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al.'s protocol does not assure the untraceabilitiy and backwarduntra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 19 publications
(25 reference statements)
0
8
0
Order By: Relevance
“…It is worth to note that the given attack is not applicable to the original protocol of Yeh et al and the complexity of the best known tag impersonation attack against the original protocol is 2 16 evaluations of PRNG function [9]. It shows that Habibi et al have decreased the security of the original protocol while trying to improve it -at least from this attack's point of view.…”
Section: Phase 2 (Impersonation)mentioning
confidence: 99%
See 4 more Smart Citations
“…It is worth to note that the given attack is not applicable to the original protocol of Yeh et al and the complexity of the best known tag impersonation attack against the original protocol is 2 16 evaluations of PRNG function [9]. It shows that Habibi et al have decreased the security of the original protocol while trying to improve it -at least from this attack's point of view.…”
Section: Phase 2 (Impersonation)mentioning
confidence: 99%
“…In this section we give a brief description of Habibi et al 's protocol -see the original paper [9] for further details. This protocol has two phases: an initialization phase and an (i + 1) th authentication phase, which are described as follows:…”
Section: Protocol Descriptionmentioning
confidence: 99%
See 3 more Smart Citations