Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard

被引:0
|
作者
Pang, Liaojun [1 ]
He, Liwei [2 ]
Pei, Qingqi [2 ]
Wang, Yumin [2 ]
机构
[1] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
[2] Xidian Univ, Dept Comp Sci, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
RFID; EPC C-1 G-2 standard; privacy; security; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As low-cost tags based on the EPC C-1 G-2 standard are much limited in storage capacity and computation power, most of the existing authentication protocols are too complicated to be suitable for these tags, and the design of authentication protocols conforming to the EPC C-1 G-2 standard is a big challenge. Recently, a mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard was proposed by Yeh et al., and it is claimed that this protocol has solved all security vulnerabilities in the existing RFID protocols. However, in fact, it is proven that this scheme is vulnerable to the tag tracing attack and suffers from the information leakage issue, and the complexity of the successful attack is only 2(16). To address these issues efficiently, a novel secure RFID authentication protocol conforming to the EPC C-1 G-2 standard is proposed. In the new scheme, the attack complexity is raised to 2(32) without changing the length of any protocol data. Analysis shows that our protocol can not only efficiently resist the tag information leakage and the tag tracing attack, but also have a significant advantage in performance over Yeh et al.'s protocol.
引用
收藏
页码:1870 / 1875
页数:6
相关论文
共 50 条
  • [31] Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
    Yoon, Eun-Jun
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (01) : 1589 - 1594
  • [32] A Protocol Based on Dynamic Secret-key for RFID in accordance with EPC C1G2 Standard
    Li, Fang
    Huang, Sheng-ye
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 459 - +
  • [33] Secure authentication scheme for passive C1G2 RFID tags
    Moessner, M.
    Khan, Gul N.
    COMPUTER NETWORKS, 2012, 56 (01) : 273 - 286
  • [34] UHF RFID Reader Implementation for EPC C1G2 Protocol
    Xu, Liyan
    Sun, Lingling
    Xiao, Zhihua
    Hu, Feiyue
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 1608 - 1611
  • [35] A Novel Mutual Authentication Scheme for RFID Conforming EPCglobal Class 1 Generation 2 Standards
    Chen, Chin-Ling
    Huang, Yu-Cheng
    Shih, Tzay-Farn
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (03): : 220 - 228
  • [36] Based on mobile RFID for membership stores system conforming EPC C1G2 standards
    Chen, Chin-Ling
    Chien, Chih-Feng
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 10 (04) : 207 - 218
  • [37] An Enhanced Q Algorithm Based on EPC-C1G2 RFID Protocol
    Niu, Cunliang
    Zhang, Hao
    Lin, Tao
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA2016), 2016, 58 : 294 - 297
  • [38] A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags
    Sundaresan, Saravanan
    Doss, Robin
    Piramuthu, Selwyn
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (06) : 961 - 975
  • [39] SAPCC1G2: a mutual authentication protocol promote the security of RFID and WSN integration system
    Rong, Jifang
    Huang, Shengye
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2011, 7 (3-4) : 249 - 261
  • [40] A novel authentication protocol suitable to EPC class 1 generation 2 RFID system
    Zhang, Junsong
    Wang, Wendong
    Ma, Jian
    Li, Xiong
    Journal of Convergence Information Technology, 2012, 7 (03) : 259 - 266