Secure EPC Gen2 Compliant Radio Frequency Identification
نویسندگان
چکیده
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 compliant protocols that address security issues were proposed in the literature. In this paper we analyze these protocols and show that they are not secure and subject to replay/impersonation and statistical analysis attacks. We then propose an EPCGen2 compliant RFID protocol that uses the numbers drawn from synchronized pseudorandom number generators (RNG) to provide secure tag identification and session unlinkability. This protocol is optimistic and its security reduces to the (cryptographic) pseudorandomness of the RNGs supported by EPCGen2.
منابع مشابه
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very basic security tools such as a 16-bit Pseudo-Random Number Generator and a 16-bit Cyclic Redundancy Code. Recently two EPCGen2 compliant protocols that address security issues were proposed in the literature. In this pa...
متن کاملKEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
The EPC Class-1 Generation-2 (Gen2 for short) is a Radio Frequency IDentification (RFID) technology that is gaining a prominent place in several domains. However, the Gen2 standard lacks of verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of applications based on the Gen2 technology. To address this problem, RFID tags must be equipped with a robu...
متن کاملDesign and emulation of new robust architectures for UHF RFID Tags
RFID ICs such as EPC gen2 tag are low cost tags which can be used for critical or secure applications. Increasing their robustness is not trivial due to the wide range of error sinks (EM perturbation, attacks...). Moreover increasing the robustness must have a minimum impact on the die area but also must fit with a standardized protocol. In this work we propose a design methodology in order to ...
متن کاملPerformance Enhancement of the Rfid Epc Gen2 Protocol by Exploiting Collision Re- Covery
Maximizing the Radio Frequency Identification (RFID) performance is one of the main challenges in application domains, such as logistics and supply chain management, where the undesired effect of Tag collisions can significantly degrade the speed of the inventory process. The dominating UHF EPC Class-1 Generation2 (EPC Gen2) protocol only specifies collision avoidance algorithms but makes no pr...
متن کاملPIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag
The Internet of Things (IoT) envisions an autonomous network between everyday objects to create real-life services. This enables new applications that necessarily require a high level of security and privacy. In this paper, we present PIONEER—a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID tag. It is the first prototype that integrates the Internet Protocol Security ...
متن کامل