TY - GEN
T1 - An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags
AU - Huang, Yu Chung
AU - Jiang, Jehn Ruey
PY - 2012
Y1 - 2012
N2 - The radio frequency identification (RFID) system is vulnerable to various attacks, since data transmission between the reader and tags is based on wireless communication. Typical attacks are the forged-reader attack, forged-server attack, man-in-the-middle attack, tracking attack, replay attack, forward secrecy attack and denial of service attack, etc. Some methods like Karthikeyan-Nesterenko's scheme, Chien-Chen's scheme, and Chien's scheme have been proposed to resist the attacks. The methods still have some flaws, though. In this paper, we proposed a mutual authentication protocol between the reader and tags conforming EPC Class 1 Generation 2 (EPC C1G2) standard to resist the attacks just mentioned. The challenge is that EPC C1G2 tags have limited memory and can perform only ultra lightweight operations like the random number generation, pseudo random number generator (PRNG) and exclusive-or (XOR) operator. We will conduct thorough security analysis for the developed protocol and comprehensively compare it with other related methods to demonstrate it is indeed better than others.
AB - The radio frequency identification (RFID) system is vulnerable to various attacks, since data transmission between the reader and tags is based on wireless communication. Typical attacks are the forged-reader attack, forged-server attack, man-in-the-middle attack, tracking attack, replay attack, forward secrecy attack and denial of service attack, etc. Some methods like Karthikeyan-Nesterenko's scheme, Chien-Chen's scheme, and Chien's scheme have been proposed to resist the attacks. The methods still have some flaws, though. In this paper, we proposed a mutual authentication protocol between the reader and tags conforming EPC Class 1 Generation 2 (EPC C1G2) standard to resist the attacks just mentioned. The challenge is that EPC C1G2 tags have limited memory and can perform only ultra lightweight operations like the random number generation, pseudo random number generator (PRNG) and exclusive-or (XOR) operator. We will conduct thorough security analysis for the developed protocol and comprehensively compare it with other related methods to demonstrate it is indeed better than others.
KW - Electronic Products Code (EPC)
KW - Mutual Authentication
KW - Privacy
KW - Radio Frequency Identification (RFID)
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84877708217&partnerID=8YFLogxK
U2 - 10.1109/PAAP.2012.28
DO - 10.1109/PAAP.2012.28
M3 - 會議論文篇章
AN - SCOPUS:84877708217
SN - 9780769548982
T3 - Proceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP
SP - 133
EP - 140
BT - Proceedings - 2012 5th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2012
T2 - 2012 5th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2012
Y2 - 17 December 2012 through 20 December 2012
ER -