Security Analysis of the SASI Protocol

@article{Cao2009SecurityAO,
  title={Security Analysis of the SASI Protocol},
  author={Tianjie Cao and Elisa Bertino and Hong Lei},
  journal={IEEE Transactions on Dependable and Secure Computing},
  year={2009},
  volume={6},
  pages={73-77}
}
The ultralightweight RFID protocols only involve simple bit-wise operations (like XOR, AND, OR, etc.) on tags. In this paper, we show that the ultralightweight strong authentication and strong integrity (SASI) protocol has two security vulnerabilities, namely denial-of-service (DoS) and anonymity tracing based on a compromised tag. The former permanently disables the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID reader. The latter links a… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 72 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Juels and S . A . Weis , “ Authentication Pervasive Device with Human Protocols

  • H. Chabanne Briger, E. Dottax
  • Proc . IEEE Int ’ l Conf . Pervasive Service…
  • 2006

Similar Papers

Loading similar papers…