A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Security Analysis of the SASI Protocol
2009
IEEE Transactions on Dependable and Secure Computing
The ultralightweight RFID protocols only involve simple bitwise operations (like XOR, AND, OR, etc.) on tags. In this paper, we show that the ultralightweight strong authentication and strong integrity (SASI) protocol has two security vulnerabilities, namely, denial-of-service and anonymity tracing based on a compromised tag. The former permanently disables the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID reader. The latter links a compromised tag with past actions performed on this tag.
doi:10.1109/tdsc.2008.32
fatcat:xsnofcnrvnbstdsnt5jy4fzpou