A Novel Authentication Protocol suitable to EPC Class 1 Generation 2 RFID system

نویسندگان

  • Junsong Zhang
  • Wendong Wang
  • Jian Ma
  • Xiong Li
چکیده

RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been proposed based on Cyclic Redundancy Check (CRC). Due to the bad properties of the CRC function used in the protocol; the claimed security objectives are not met. In this paper, we propose a novel authentication protocol based on Gen2 for low-cost RFID tags which use the Pseudo-Random Number Generator (PRNG in brief) function instead of the CRC function. The advantages of the novel authentication is that the proposed protocol could withstand de-synchronization attack, disclosure attack and cloning attack, furthermore, it also could provide anonymity and mutual authentication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of an RFID Authentication Protocol in Accordance with EPC Standards

In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end-users, they can make security and privacy concerns for them. In this paper we analyze the security of an RFID mutual...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Security Protocol for RFID System Conforming to EPC-C1G2 Standard

Last few years, many security schemes are designed for RFID system since the release of the EPC Class 1 Generation 2 standard. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. Yoon pointed that their protocol still had two serious security problems such as DATA integrity problem and forward secrecy problem. Then he proposed an impr...

متن کامل

A Study for the Convictional Authentication of EPC Global Class-1 Generation-2

Epcglobal class-1 generation-2 has been approved by the ISO18000-6C for the global usage. Here the tag can be traceable and that is transmitted into the plain text . In traditional encryption methods we use symmetric or asymmetric ciphers but this encryption methods are not suitable for the RFID tags. Gen2 has proposed some lightweight authentication protocols. Here message flow in RFID tag is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012