A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard

被引:4
|
作者
Chang, Chin-Chen [1 ,2 ]
Chen, Wei-Yi [3 ]
Cheng, Ting-Fang [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[3] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62102, Taiwan
关键词
RFID; DoS attack; EPC Class 1 Generation 2; mutual authentication; replay attack; privacy;
D O I
10.1109/IIH-MSP.2014.166
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID is a non-contact technology using radio frequencies to achieve automatic and unique identification. It has been widely applied in various areas, such as access management, toll collection, and contactless payment. However, because the information transmission medium between readers and tags is radio frequency, it is easy for attackers to eavesdrop on or tamper with data. Hence, creating a secure RFID protocol is very important. In 2012, Cho et al. proposed a hash-based RFID authentication protocol for defense against brute-force attacks. Unfortunately, we find that their protocol is vulnerable to DoS and replay attacks and two design weaknesses about privacy and the authentication procedure. To enhance security, we propose an improvement that conforms to the Electronic Product Code (EPC) Class 1 Generation 2 standard for passive tags. The analyses demonstrate that our protocol can defend against security threats existing in RFID systems and is more applicable for low-cost RFID tags.
引用
收藏
页码:642 / 645
页数:4
相关论文
共 50 条
  • [21] A Power Efficient Secure Mutual Authentication Protocol for EPC Gen2v2 standard
    Nguyen Xuan Hieu
    Van Nhan Nguyen
    Park, Dasom
    Chung, Doyoung
    Lee, Hyunsik
    Lee, Jong-Wook
    2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 325 - 326
  • [22] Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 372 - 380
  • [23] Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard
    Zavvari, Azam
    Shakiba, Masoud
    Islam, Mohammad Tariqul
    Sundararajan, Elankovan
    Singh, Mandeep Jit
    4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 778 - 784
  • [24] Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard
    Li Huixian
    Hu Jinshun
    He Liwei
    Pang Liaojun
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 678 - 682
  • [25] Security Protocol for RFID System Conforming to EPC-C1G2 Standard
    Xiao, Feng
    Zhou, Yajian
    Zhou, Jingxian
    Zhu, Hongliang
    Niu, Xinxin
    JOURNAL OF COMPUTERS, 2013, 8 (03) : 605 - 612
  • [26] Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol
    Nasour Bagheri
    Masoumeh Safkhani
    Majid Naderi
    Neural Computing and Applications, 2014, 24 : 799 - 805
  • [27] Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol
    Bagheri, Nasour
    Safkhani, Masoumeh
    Naderi, Majid
    NEURAL COMPUTING & APPLICATIONS, 2014, 24 (3-4): : 799 - 805
  • [28] Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
    Peris-Lopez, Pedro
    Li, Tieyan
    Hernandez-Castro, Julio C.
    Tapiador, Juan M. E.
    COMPUTER COMMUNICATIONS, 2009, 32 (7-10) : 1185 - 1193
  • [29] An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication
    Jia, Qingxuan
    Wang, Xin
    Gao, Xin
    Gao, Panpan
    Zhao, Bing
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1966 - +
  • [30] An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2012, : 133 - 140