On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
نویسنده
چکیده
RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Recently, Moessner’s and Khan’s proposed an authentication scheme for passive RFID tags that can be embeddable into the ubiquitous EPCglobal C1G2 protocol in order to offers a high level of security through the combination of a random key scheme with a strong cryptography. In this paper a tag traceability attack and a server impersonation attack are presented. An improved scheme that eliminates these two attacks and decreases the storage requirements is also presented. These improvements introduce slight modification to the scheme.
منابع مشابه
A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards
Abstract. Radio-frequency identification (RFID) is an automatic identification technology. In recent years, more and more applications have been found for its use. However, there are still many security issues worth discussing. In this paper, we propose a mutual authentication scheme, which can solve problems such as privacy, replay attack, forward security, and user location privacy. In our sc...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification
Low-cost Radio Frequency Identification (RFID) tags are devices with very limited computational capability, in which only 250-4K logic gates can be devoted to securityrelated tasks. Classical cryptographic primitives such as block ciphers or hash functions are well beyond the computational capabilities of low-cost RFID tags, as ratified by the EPCglobal Class-1 Gen-2 RFID specification. Moreove...
متن کاملAn Efficient Mutual Authentication Protocol on RFID Tags
Recently, as low-cost radio frequency identification (RFID) becomes more pervasive in our daily lives, RFID systems may create new threats to security and privacy of individuals and organizations. It must have secure mutual authentication mechanisms to protect privacy information. However, the previous works on designing security protocols for RFID either do not conform to the EPCglobal Class 1...
متن کاملAn Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System
The nature of data security vulnerability and location privacy invasion of RFID systems have become a serious problem after hundreds of RFID application systems deployed all over the world. One of the promising solution directions is to provide an efficient authentication scheme with the compliance of international RFID standards such as EPCglobal, ISO18000-1 and ISO18000-6. In this study, we p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 16 شماره
صفحات -
تاریخ انتشار 2014