Improvement of an EPC Gen2 compliant RFID authentication protocol

被引:4
|
作者
Yeh, Kuo-Hui [1 ]
Lo, N. W. [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
RFID; Authentication; TRAP-3; EPC Gen2 standard; Security; Privacy;
D O I
10.1109/IAS.2009.341
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, lightweight RFID authentication protocol has been investigated extensively due to the awareness of practical requirements on individual privacy, robust system security and resource limitation of low-cost tags. Research studies have demonstrated major advancements in the direction of designing a secure access control mechanism for RFID system with resource-constrained tags. In 2008, Burmester and Medeiros developed an EPC Class 1 Generation 2 (EPC Gen2) compliant authentication protocol, called TRAP-3, to support tag anonymity, data confidentiality and forward security in which only primitive computation functions such as 32-bit pseudo random generator and simple exclusive-or operation are required. Nevertheless.. TRAP-3 is vulnerable to desynchronization attack. The secret key value, which is shared between the tag and the backend database, can be out of synchronization by just performing a series of challenge-response operations. To remedy this authentication flaw, in this study we develop a countermeasure mechanism and accordingly gain security enhancement for TRAP-3.
引用
收藏
页码:532 / 535
页数:4
相关论文
共 50 条
  • [1] Implementation of a New RFID Authentication Protocol for EPC Gen2 Standard
    Liu, Zilong
    Liu, Dongsheng
    Li, Lun
    Lin, Hui
    Yong, Zhenqiang
    IEEE SENSORS JOURNAL, 2015, 15 (02) : 1003 - 1011
  • [2] The security of EPC Gen2 compliant RFID protocols
    Burmester, Mike
    de Medeiros, Breno
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 490 - +
  • [3] A Simulation tool for RFID EPC GEN2 protocol
    Landaluce, Hugo
    Perallos, Asier
    Angulo, Ignacio
    7TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2012), 2012,
  • [4] An improved mutual authentication scheme for EPC Gen2 RFID tag
    Xuan, Xiuwei
    Li, Kun
    Cao, Yang
    ICIC Express Letters, 2015, 9 (08): : 2119 - 2124
  • [5] An Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1385 - 1391
  • [6] A Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 402 - 405
  • [7] A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard
    Jin, Guiyue
    Jin, Jiyu
    Tao, Xueheng
    Li, Baoying
    2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 286 - 290
  • [8] Protocol Simulation Tool EPC GEN2 RFID Class 1
    Landaluce, Hugo
    Perallos, Asier
    Angulo, Ignacio
    SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2, 2012, : 378 - 383
  • [9] KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
    Tounsi, Wiem
    Cuppens-Boulahia, Nora
    Garcia-Alfaro, Joaquin
    Chevalier, Yannick
    Cuppens, Frederic
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 : 152 - 166
  • [10] Secure EPC Gen2 Compliant Radio Frequency Identification
    Burmester, Mike
    de Medeiros, Breno
    Munilla, Jorge
    Peinado, Alberto
    AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2009, 5793 : 227 - +