A Gen2 Based Security Authentication Protocol for RFID System

被引:0
作者
Yi, Xiaoluo [1 ]
Wang, Liangmin [2 ]
Mao, Dongmei [1 ]
Zhan, Yongzhao [1 ]
机构
[1] Sch Comp Sci & Commun Engn, Zhenjiang, Peoples R China
[2] Dept Comp Sci, Zhenjiang, Peoples R China
来源
2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III | 2010年
基金
中国国家自然科学基金;
关键词
RFID; EPC Class-1 Generation-2 Specification; Security Protocol;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
EPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number IS018000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7-13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14-15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative.
引用
收藏
页码:402 / 405
页数:4
相关论文
共 14 条
[1]  
[Anonymous], 2006 S CRYPT INF SEC
[2]   A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis [J].
Cai Qingling ;
Zhan Yiju ;
Wang Yonghua .
2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 2, PROCEEDINGS, 2008, :449-453
[3]   Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection [J].
Chen, Chin-Ling ;
Deng, Yong-Yuan .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2009, 22 (08) :1284-1291
[4]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[5]   Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems [J].
Choi, Eun Young ;
Lee, Dong Hoon ;
Lim, Jong In .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) :1124-1130
[6]   Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards [J].
Han, Daewan ;
Kwon, Daesung .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :648-652
[7]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[8]  
Karthikeyan S., 2005, P 3 ACM WORKSHOP SEC, P63
[9]  
Peris-Lopez P, 2007, WORKSH RFID SEC RFID
[10]  
Peris-Lopez P, 2009, J INF SCI ENG, V25, P33