Attack and Solution on 3K-RFID Authentication Protocol 


Vol. 34,  No. 6, pp. 578-587, Jun.  2009


PDF
  Abstract

In 2005, Ko-Kim-Kwon pointed out Henrici-Muller's hash based RFID authentication protocol is insecure to location tracking attack, spoofing attack and Denial of Service attack. Then, they proposed a new RFID authentication protocol(3K-RFID) that can withstand these security problems. However, this paper shows that 3K-RFID authentication protocol is still not only vulnerable to spoofing attack and Denial of Service attack but also does not provide forward secrecy, and then proposes an improved secure I3K-RFID authentication protocol in order to resolve such problems.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

E. Yoon, K. Bu, K. Ha, K. Yoo, "Attack and Solution on 3K-RFID Authentication Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 6, pp. 578-587, 2009. DOI: .

[ACM Style]

Eun-Jun Yoon, Ki-Dong Bu, Kyeoung-Ju Ha, and Kee-Young Yoo. 2009. Attack and Solution on 3K-RFID Authentication Protocol. The Journal of Korean Institute of Communications and Information Sciences, 34, 6, (2009), 578-587. DOI: .

[KICS Style]

Eun-Jun Yoon, Ki-Dong Bu, Kyeoung-Ju Ha, Kee-Young Yoo, "Attack and Solution on 3K-RFID Authentication Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 6, pp. 578-587, 6. 2009.