Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard

被引:0
|
作者
Pang, Liaojun [1 ]
He, Liwei [2 ]
Pei, Qingqi [2 ]
Wang, Yumin [2 ]
机构
[1] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
[2] Xidian Univ, Dept Comp Sci, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
RFID; EPC C-1 G-2 standard; privacy; security; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As low-cost tags based on the EPC C-1 G-2 standard are much limited in storage capacity and computation power, most of the existing authentication protocols are too complicated to be suitable for these tags, and the design of authentication protocols conforming to the EPC C-1 G-2 standard is a big challenge. Recently, a mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard was proposed by Yeh et al., and it is claimed that this protocol has solved all security vulnerabilities in the existing RFID protocols. However, in fact, it is proven that this scheme is vulnerable to the tag tracing attack and suffers from the information leakage issue, and the complexity of the successful attack is only 2(16). To address these issues efficiently, a novel secure RFID authentication protocol conforming to the EPC C-1 G-2 standard is proposed. In the new scheme, the attack complexity is raised to 2(32) without changing the length of any protocol data. Analysis shows that our protocol can not only efficiently resist the tag information leakage and the tag tracing attack, but also have a significant advantage in performance over Yeh et al.'s protocol.
引用
收藏
页码:1870 / 1875
页数:6
相关论文
共 50 条
  • [1] Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
    Habibi, Mohammad Hassan
    Alagheband, Mahdi R.
    Aref, Mohammad Reza
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 254 - 263
  • [2] A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard
    Chang, Chin-Chen
    Chen, Wei-Yi
    Cheng, Ting-Fang
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 642 - 645
  • [3] Strengthening the Security of EPC C-1 G-2 RFID Standard
    Masoumeh Safkhani
    Nasour Bagheri
    Majid Naderi
    Wireless Personal Communications, 2013, 72 : 1295 - 1308
  • [4] Strengthening the Security of EPC C-1 G-2 RFID Standard
    Safkhani, Masoumeh
    Bagheri, Nasour
    Naderi, Majid
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (02) : 1295 - 1308
  • [5] SLRV: An RFID mutual authentication protocol conforming to EPC generation-2 standard
    Khalifa City Womens College, Higher College of Technology HCT, Abu Dhabi, United Arab Emirates
    不详
    不详
    Telkomnika Telecomun. Compt. Electr. Control, 3 (1054-1061): : 1054 - 1061
  • [6] Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    Chien, Hung-Yu
    Chen, Che-Hao
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 254 - 259
  • [7] Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 372 - 380
  • [8] Security Protocol for RFID System Conforming to EPC-C1G2 Standard
    Xiao, Feng
    Zhou, Yajian
    Zhou, Jingxian
    Zhu, Hongliang
    Niu, Xinxin
    JOURNAL OF COMPUTERS, 2013, 8 (03) : 605 - 612
  • [9] Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard
    Li Huixian
    Hu Jinshun
    He Liwei
    Pang Liaojun
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 678 - 682
  • [10] A Secure Mutual Authentication Protocol to Maintain Synchrony Conforming to EPC Gen2V2 Standard
    Jin, Guiyue
    Jin, Jiyu
    Li, Baoying
    Mou, Jun
    Li, Peng
    Zhao, Xin
    MATERIALS, INFORMATION, MECHANICAL, ELECTRONIC AND COMPUTER ENGINEERING (MIMECE 2016), 2016, : 165 - 171