Back to Search Start Over

Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol

Authors :
Kapoor, Gaurav
Piramuthu, Selwyn
Source :
Engineering Applications of Artificial Intelligence. Oct2011, Vol. 24 Issue 7, p1300-1302. 3p.
Publication Year :
2011

Abstract

Abstract: As incorporation of RFID (Radio Frequency IDentification) tags in a wide variety of applications increase, there is a need to ensure the security and privacy of the entity to which these tags are attached. Not surprisingly, this is a very active area as attested by the large number of related published research literature. Recently, the journal engineering applications of artificial intelligence published a paper by where the authors propose a mutual authentication protocol for RFID. This protocol has fundamental flaws that can be readily taken advantage by a resourceful adversary. We identify and discuss these vulnerabilities and point out the characteristics of this protocol that exposes it to these vulnerabilities. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
09521976
Volume :
24
Issue :
7
Database :
Academic Search Index
Journal :
Engineering Applications of Artificial Intelligence
Publication Type :
Academic Journal
Accession number :
65130846
Full Text :
https://doi.org/10.1016/j.engappai.2011.06.011