A Secure Mutual Authentication Protocol to Maintain Synchrony Conforming to EPC Gen2V2 Standard
نویسندگان
چکیده
منابع مشابه
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole sec...
متن کاملCryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Article history: In 2006, the standard EPC Received 16 May 2007 Received in revised form 7 March 2008 Accepted 4 May 2008 Available online 18 May 2008
متن کاملSecurity Protocol for RFID System Conforming to EPC-C1G2 Standard
Last few years, many security schemes are designed for RFID system since the release of the EPC Class 1 Generation 2 standard. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. Yoon pointed that their protocol still had two serious security problems such as DATA integrity problem and forward secrecy problem. Then he proposed an impr...
متن کاملAttacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we show that the proposed protocol does not have cited security features properly. A powerful and practical attack is presented on this protocol whereby the whole security of the ...
متن کاملAnalysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy. EPC Class 1 Generation 2 has serve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Engineering and Technology Research
سال: 2017
ISSN: 2475-885X
DOI: 10.12783/dtetr/mimece2016/9998