First of all, they claim that
the message blocking attack works only if the final message is
blocked. However, we show that this attack still works between
the reader and the tag even if the third message is blocked or
dropped. Secondly, we show that their protocols are not resistant
message injection attack due to the lack of message integrity. We
also highlight that the LFSR has been misused in their scheme
which yields a vulnerability of privacy. Finally, their ownership
transfer protocol does not provide tag privacy against the old
owner of the tag.
Index Terms—RFID, PUF, Security, Privacy.
First of all, they claim thatthe message blocking attack works only if the final message isblocked. However, we show that this attack still works betweenthe reader and the tag even if the third message is blocked ordropped. Secondly, we show that their protocols are not resistantmessage injection attack due to the lack of message integrity. Wealso highlight that the LFSR has been misused in their schemewhich yields a vulnerability of privacy. Finally, their ownershiptransfer protocol does not provide tag privacy against the oldowner of the tag.Index Terms—RFID, PUF, Security, Privacy.
การแปล กรุณารอสักครู่..