A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard

被引:4
|
作者
Chang, Chin-Chen [1 ,2 ]
Chen, Wei-Yi [3 ]
Cheng, Ting-Fang [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[3] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62102, Taiwan
关键词
RFID; DoS attack; EPC Class 1 Generation 2; mutual authentication; replay attack; privacy;
D O I
10.1109/IIH-MSP.2014.166
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID is a non-contact technology using radio frequencies to achieve automatic and unique identification. It has been widely applied in various areas, such as access management, toll collection, and contactless payment. However, because the information transmission medium between readers and tags is radio frequency, it is easy for attackers to eavesdrop on or tamper with data. Hence, creating a secure RFID protocol is very important. In 2012, Cho et al. proposed a hash-based RFID authentication protocol for defense against brute-force attacks. Unfortunately, we find that their protocol is vulnerable to DoS and replay attacks and two design weaknesses about privacy and the authentication procedure. To enhance security, we propose an improvement that conforms to the Electronic Product Code (EPC) Class 1 Generation 2 standard for passive tags. The analyses demonstrate that our protocol can defend against security threats existing in RFID systems and is more applicable for low-cost RFID tags.
引用
收藏
页码:642 / 645
页数:4
相关论文
共 50 条
  • [1] Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    Chien, Hung-Yu
    Chen, Che-Hao
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 254 - 259
  • [2] SLRV: An RFID mutual authentication protocol conforming to EPC generation-2 standard
    Khalifa City Womens College, Higher College of Technology HCT, Abu Dhabi, United Arab Emirates
    不详
    不详
    Telkomnika Telecomun. Compt. Electr. Control, 3 (1054-1061): : 1054 - 1061
  • [3] A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
    Tang, Lin
    Bai, Enjian
    Wu, Wenqiang
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1845 - +
  • [4] A forward-secure RFID protocol conforming to EPC class 1 generation 2 standard
    Yeh, Tzu-Chang, 1600, Chung Cheng Institute of Technology (42):
  • [5] Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard
    Pang, Liaojun
    He, Liwei
    Pei, Qingqi
    Wang, Yumin
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1870 - 1875
  • [6] An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard
    Chuang, Tsung-I
    Yang, Wei-Ning
    Lo, Nai-Wei
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (05): : 727 - 732
  • [7] Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
    Han, Daewan
    Kwon, Daesung
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 648 - 652
  • [8] A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard
    Jin, Guiyue
    Jin, Jiyu
    Tao, Xueheng
    Li, Baoying
    2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 286 - 290
  • [9] A Secure Mutual Authentication Protocol to Maintain Synchrony Conforming to EPC Gen2V2 Standard
    Jin, Guiyue
    Jin, Jiyu
    Li, Baoying
    Mou, Jun
    Li, Peng
    Zhao, Xin
    MATERIALS, INFORMATION, MECHANICAL, ELECTRONIC AND COMPUTER ENGINEERING (MIMECE 2016), 2016, : 165 - 171
  • [10] Securing RFID systems conforming to EPC Class 1 Generation 2 standard
    Yeh, Tzu-Chang
    Wang, Yan-Jun
    Kuo, Tsai-Chi
    Wang, Sheng-Shih
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7678 - 7683