Cryptanalysis on the RFID ACTION Protocol

Abstract

There are increasing concerns on the security of RFID usages. Recently, Lu et al. presented ACTION, a privacy preservative authentication protocol for RFID. It is claimed that it achieves high level of security even if a large number of tags is compromised. However, we found that this protocol is vulnerable to two severe attacks: Desynchronizing attacks and Tracking attacks. In this paper, we present how these two attacks work even if the protocol parameters are moderated.

4 Figures and Tables

Cite this paper

@inproceedings{Sun2011CryptanalysisOT, title={Cryptanalysis on the RFID ACTION Protocol}, author={H. M. Sun and Kun Hua Wang}, year={2011} }