CINXE.COM

Tag Impersonation Attack on UltraLightweight Radio Frequency Identification Authentication Scheme

<?xml version="1.0" encoding="UTF-8"?> <article key="pdf/10013694" mdate="2024-07-03 00:00:00"> <author>Reham Al-Zahrani and Noura Aleisa</author> <title>Tag Impersonation Attack on UltraLightweight Radio Frequency Identification Authentication Scheme</title> <pages>353 - 366</pages> <year>2024</year> <volume>18</volume> <number>7</number> <journal>International Journal of Computer and Systems Engineering</journal> <ee>https://publications.waset.org/pdf/10013694</ee> <url>https://publications.waset.org/vol/211</url> <publisher>World Academy of Science, Engineering and Technology</publisher> <abstract>The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary&amp;039;s tag is used to fool an authenticating reader into believing it is a legitimate tag. The paper thoroughly analyses the security of the Efficient, Secure, and Practical UltraLightweight RFID Authentication Scheme (ESRAS). It examines the protocol within the context of RFID systems and focuses specifically on its vulnerability to tag impersonation attacks. The Scyther tool is utilized to assess the protocol&amp;039;s security, providing a comprehensive evaluation of ESRAS&amp;039;s effectiveness in preventing unauthorized tag impersonation.</abstract> <index>Open Science Index 211, 2024</index> </article>