A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard

Article Preview

Abstract:

With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often used to identify object because it can work without manual intervention. Several organizations including EPC global and ISO have been working on the standard of RFID all the time in order to promote it using low-cost tags. In particular, the EPC Class-1 Generation-2 standard was accepted as an international standard by ISO/IEC. However, this standard exists some security vulnerabilities. To resolve these vulnerabilities, some protocols conforming to EPC Class 1 Generation 2 was proposed. In this paper, we show the weaknesses which exist in RFID system’s security protocols conforming to EPC Class-1 Generation-2 and submit a new security protocol suitable to the standard, then validate the whole security performance of the new protocol. The safety performance of the new protocol and existing protocols are also compared in this paper .The result shows that the the new protocol could be used in the low-cost tag because of its high security and low communication complexity.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

1845-1848

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E.Y. Choi, D.H. Lee, J.I. Lim, Anti-cloning protocol suitable to EPC global Class-1 Generation-2 RFID systems, Computer Standards &Interfaces, 2009, 31(6): 1124-1130.

DOI: 10.1016/j.csi.2008.12.002

Google Scholar

[2] Information on http: /www. gs1. org/epcglobal.

Google Scholar

[3] D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning, The 2006 Symposium on Cryptography and Information Security, 2006, 1-6.

DOI: 10.1007/978-3-540-71641-9_15

Google Scholar

[4] P.P. Lopez, J.C.H. Castro J.M.E. Tapiador, A. Ribagorda, Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard, Computer Standards & Interfaces, 2009, 31(2): 372-380.

DOI: 10.1016/j.csi.2008.05.012

Google Scholar

[5] Q.L. Cai, Y.J. Zhan, Y.H. Wang, A minimalist mutual authentication protocol for RFID system & BAN logic analysis, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management, 2008, 449-453.

DOI: 10.1109/cccm.2008.305

Google Scholar

[6] H.Y. Chien, C.H. Chen, Mutual authentication protocol for RFID conforming to EPC class-1 generation-2 standards, Computer Standards & Interfaces, 2007, 29(2): 254-259.

DOI: 10.1016/j.csi.2006.04.004

Google Scholar

[7] D. Han, D. Kwon, Vulnerability of an RFID authentication protocol conforming to EPC Class1 Generation 2 Standards, Computer Standards & Interfaces, 2009, 31(2): 648-652.

DOI: 10.1016/j.csi.2008.06.006

Google Scholar

[8] T.C. Yeh, Y.J. Wang, T.C. Kuo, S.S. Wang, Securing RFID systems conforming to EPC Class- 1 Generation 2 standard, Expert Systems with Applications, 2010, 37(12): 7678-7683.

DOI: 10.1016/j.eswa.2010.04.074

Google Scholar

[9] D.H. Seo, J.M. Baek, D.S. Cho, Secure RFID authentication scheme for EPC Class Gen2, 3th International Conference on Ubiquitous Information Management and Communication, 2009, 221-227.

DOI: 10.1145/1516241.1516280

Google Scholar