Security of an RFID protocol for supply chains

Ton van Deursen*, Saša Radomirović

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed to illustrate several shortcomings in the protocol with respect to mutual authentication, unlinkability, and desynchronization resistance. We investigate the use of the xor operator in the protocol, suggest possible improvements, and point out flaws in the proofs of the security claims.

Original languageEnglish
Title of host publication2008 IEEE International Conference on e-Business Engineering
PublisherIEEE
Pages568-573
Number of pages6
ISBN (Print)9780769533957
DOIs
Publication statusPublished - 2 Dec 2008
Event2008 IEEE International Conference on e-Business Engineering - Xi'an, China
Duration: 22 Oct 200824 Oct 2008

Conference

Conference2008 IEEE International Conference on e-Business Engineering
Abbreviated titleICEBE'08
Country/TerritoryChina
CityXi'an
Period22/10/0824/10/08

ASJC Scopus subject areas

  • Management of Technology and Innovation
  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Security of an RFID protocol for supply chains'. Together they form a unique fingerprint.

Cite this