Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard

被引:3
|
作者
Li Huixian [1 ]
Hu Jinshun [1 ]
He Liwei [2 ]
Pang Liaojun [2 ]
机构
[1] Nortwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Peoples R China
[2] Xidian Univ, Key Lab Integrated Serv Networks, Xian, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
ownership transfer; mutual authentication; privacy protection; EPC-C1G2;
D O I
10.1109/CIS.2012.156
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a RFID (Radio Frequency Identification)-enabled system, RFID tags often need to change hands from one owner to another during their lifetime, which makes the design of excellent RFID tag ownership transfer schemes more urgent than ever before. In this paper, we propose a lightweight mutual authentication and ownership transfer scheme, which conforms to the standard EPC Class-1 Generation-2 (EPC-C1G2). This scheme can resist tracking, counterfeiting, and denial of service attacks and achieve the privacy protection of both the new user and the old user. At the same time, this scheme has a certain ability to detect tags which need to transfer their ownership and achieves complete ownership transfer. Compared with the existing similar schemes, this scheme is more secure and efficient.
引用
收藏
页码:678 / 682
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 372 - 380
  • [2] Security Protocol for RFID System Conforming to EPC-C1G2 Standard
    Xiao, Feng
    Zhou, Yajian
    Zhou, Jingxian
    Zhu, Hongliang
    Niu, Xinxin
    JOURNAL OF COMPUTERS, 2013, 8 (03) : 605 - 612
  • [3] Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard
    Pang, Liaojun
    He, Liwei
    Pei, Qingqi
    Wang, Yumin
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1870 - 1875
  • [4] A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard
    Chang, Chin-Chen
    Chen, Wei-Yi
    Cheng, Ting-Fang
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 642 - 645
  • [5] SLRV: An RFID mutual authentication protocol conforming to EPC generation-2 standard
    Khalifa City Womens College, Higher College of Technology HCT, Abu Dhabi, United Arab Emirates
    不详
    不详
    Telkomnika Telecomun. Compt. Electr. Control, 3 (1054-1061): : 1054 - 1061
  • [6] Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols
    Martin, Honorio
    San Millan, Enrique
    Peris-Lopez, Pedro
    Tapiador, Juan E.
    IEEE SENSORS JOURNAL, 2013, 13 (10) : 3537 - 3547
  • [7] Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
    Habibi, Mohammad Hassan
    Alagheband, Mahdi R.
    Aref, Mohammad Reza
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 254 - 263
  • [8] A Secure Minimalist RFID Authentication and an Ownership Transfer Protocol Compliant to EPC C1G2
    Edelev, Sviatoslav
    Taheri, Somayeh
    Hogrefe, Dieter
    2015 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (RFID-TA), 2015, : 126 - 133
  • [9] Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    Chien, Hung-Yu
    Chen, Che-Hao
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 254 - 259
  • [10] A Secure Mutual Authentication Protocol to Maintain Synchrony Conforming to EPC Gen2V2 Standard
    Jin, Guiyue
    Jin, Jiyu
    Li, Baoying
    Mou, Jun
    Li, Peng
    Zhao, Xin
    MATERIALS, INFORMATION, MECHANICAL, ELECTRONIC AND COMPUTER ENGINEERING (MIMECE 2016), 2016, : 165 - 171