Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
نویسندگان
چکیده
Article history: In 2006, the standard EPC Received 16 May 2007 Received in revised form 7 March 2008 Accepted 4 May 2008 Available online 18 May 2008
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملPractical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
The EPC Class-1 Generation-2 RFID standard provides little security, as has been shown in previous works such as [S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and...
متن کاملSecurity Protocol for RFID System Conforming to EPC-C1G2 Standard
Last few years, many security schemes are designed for RFID system since the release of the EPC Class 1 Generation 2 standard. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. Yoon pointed that their protocol still had two serious security problems such as DATA integrity problem and forward secrecy problem. Then he proposed an impr...
متن کاملCryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...
متن کاملA Mutual Authentication Protocol for RFID Using IDEA
A security enhanced tag developed by Fudan University is introduced in this paper. This tag is designed to be compatible with EPC Class 1 Generation 2 protocol (EPC C1G2), and can be extended to support mutual authentication and to encrypt communication between reader and tag. A mutual authentication scheme is proposed, and low cost cryptographic algorithm core is implemented in the tag to acco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Standards & Interfaces
دوره 31 شماره
صفحات -
تاریخ انتشار 2009