Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard

被引:0
|
作者
Pang, Liaojun [1 ]
He, Liwei [2 ]
Pei, Qingqi [2 ]
Wang, Yumin [2 ]
机构
[1] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
[2] Xidian Univ, Dept Comp Sci, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
RFID; EPC C-1 G-2 standard; privacy; security; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As low-cost tags based on the EPC C-1 G-2 standard are much limited in storage capacity and computation power, most of the existing authentication protocols are too complicated to be suitable for these tags, and the design of authentication protocols conforming to the EPC C-1 G-2 standard is a big challenge. Recently, a mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard was proposed by Yeh et al., and it is claimed that this protocol has solved all security vulnerabilities in the existing RFID protocols. However, in fact, it is proven that this scheme is vulnerable to the tag tracing attack and suffers from the information leakage issue, and the complexity of the successful attack is only 2(16). To address these issues efficiently, a novel secure RFID authentication protocol conforming to the EPC C-1 G-2 standard is proposed. In the new scheme, the attack complexity is raised to 2(32) without changing the length of any protocol data. Analysis shows that our protocol can not only efficiently resist the tag information leakage and the tag tracing attack, but also have a significant advantage in performance over Yeh et al.'s protocol.
引用
收藏
页码:1870 / 1875
页数:6
相关论文
共 50 条
  • [21] Authentication Protocol Conforming to EPC Class-1 Gen-2 Standard
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), 2016, : 13 - 18
  • [22] Analysis of Xiao et al.'s Authentication Protocol Conforming to EPC C1 G2 Standard
    Abdolmaleki, Behzad
    Baghery, Karim
    Akhbari, Bahareh
    Aref, Mohammad Reza
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 111 - 116
  • [23] PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 Standards
    Wang, Jiahao
    Wong, Edward C.
    Ye, Terry
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 289 - +
  • [24] A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
    Poulopoulos, George
    Markantonakis, Konstantinos
    Mayes, Keith
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 706 - 711
  • [25] A New Lightweight RFID Authentication Protocol for The EPC Class 1 Gen 2 Standard
    Zhang Wei
    Wang Jianhan
    Zhu Xinxin
    Mei Ying
    PROCEEDINGS OF 2013 INTERNATIONAL SYMPOSIUM ON APPLIED ENGINEERING, TECHNICAL MANAGEMENT, AND INNOVATION, 2014, : 215 - 218
  • [26] Implementation of a New RFID Authentication Protocol for EPC Gen2 Standard
    Liu, Zilong
    Liu, Dongsheng
    Li, Lun
    Lin, Hui
    Yong, Zhenqiang
    IEEE SENSORS JOURNAL, 2015, 15 (02) : 1003 - 1011
  • [27] Defense against Impersonating Attackers: An Efficient RFID Mutual Authentication Protocol Based on Standard
    Wang, Shiqi
    Li, Linsen
    Chen, Gaosheng
    Chen, Tao
    Wang, Zeming
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 234 - 240
  • [28] Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols
    Martin, Honorio
    San Millan, Enrique
    Peris-Lopez, Pedro
    Tapiador, Juan E.
    IEEE SENSORS JOURNAL, 2013, 13 (10) : 3537 - 3547
  • [29] Securing RFID systems conforming to EPC Class 1 Generation 2 standard
    Yeh, Tzu-Chang
    Wang, Yan-Jun
    Kuo, Tsai-Chi
    Wang, Sheng-Shih
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7678 - 7683
  • [30] EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol
    Niu, Haifeng
    Taqieddin, Eyad
    Jagannathan, S.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (01) : 137 - 149