Security Improvement in Authentication Protocol for Gen-2 Based RFID System
نویسندگان
چکیده
The EPC Class-1 Generation-2 specification(Gen-2 in brief) is widely accepted as the standard for RFID tags under grant number ISO18000-6c. However, there are two problems in view of its security authentication protocols. First of all, there is no unified standard for the security requirements, such as which threats should be protected against. Secondly, there is no widely acceptable means to guarantee the security, for the provable security methods are not applicable without using encryption function or hash function. In this paper, we study the security requirements presented in the current Gen-2 based RFID authentication protocols, and summarize an Enhancing Security Standard that contains all 10 security characteristics discussed in literatures [10-17]. We point out the security drawbacks of Chien’s mutual authentication protocol[10] , and improve the protocol based on the 10 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen-2 that require very low communication and computation loads. We also develop two methods based on BAN logic and AVISTA to prove the security of RFID protocol. BAN logic is used to give the proof of protocol correctness, and AVISTA is used to affirm the authentication and secrecy properties.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملAn Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification
Low-cost Radio Frequency Identification (RFID) tags are devices with very limited computational capability, in which only 250-4K logic gates can be devoted to securityrelated tasks. Classical cryptographic primitives such as block ciphers or hash functions are well beyond the computational capabilities of low-cost RFID tags, as ratified by the EPCglobal Class-1 Gen-2 RFID specification. Moreove...
متن کاملAn Efficient Mutual Authentication Protocol on RFID Tags
Recently, as low-cost radio frequency identification (RFID) becomes more pervasive in our daily lives, RFID systems may create new threats to security and privacy of individuals and organizations. It must have secure mutual authentication mechanisms to protect privacy information. However, the previous works on designing security protocols for RFID either do not conform to the EPCglobal Class 1...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011