Journal ArticleDOI
Short communication: Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
TLDR
This paper demonstrates that Yeh et al.'s protocol has two serious security problems such as DATA integrity problem and forward secrecy problem unlike their claims, and proposes an improved protocol which can prevent the security problems and be applied in low-cost RFID environments requiring a high level of security.Abstract:
Radio frequency identification (RFID) technology is taking the place of barcodes to become electronic tags of the new generation. EPC Class 1 Generation 2 has served as the most popular standard for passive RFID tags. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. However, this paper demonstrates that Yeh et al.'s protocol has two serious security problems such as DATA integrity problem and forward secrecy problem unlike their claims. An improved protocol is also proposed which can prevent the security problems and be applied in low-cost RFID environments requiring a high level of security.read more
Citations
More filters
Journal ArticleDOI
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
TL;DR: A novel RFID authentication protocol based on elliptic curve cryptography is designed, which is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency.
Journal ArticleDOI
Security Analysis and Improvement on Two RFID Authentication Protocols
TL;DR: A passive disclosure attack on RAPLT protocol is presented, and it is demonstrated that SRP ^{++}$$SRP++ protocol can resist the exhaustive search attack with the complexity O(2^{32})$$O(232), which is the optimal security bound.
Book ChapterDOI
Secure Improved Cloud-Based RFID Authentication Protocol
TL;DR: It is shown that the Xie et al. protocol is vulnerable to reader impersonation attacks, location tracking and tag’s data privacy invasion, and the results indicate that the proposed protocol achieves data secrecy and authentication for RFID tags.
Journal ArticleDOI
Improvement of the Hash-Based RFID Mutual Authentication Protocol
TL;DR: This paper further shows that Cho et al.
Journal ArticleDOI
Traceability Analysis of Recent RFID Authentication Protocols
TL;DR: In order to keep and protect the privacy of RFID users, two improved versions of analyzed protocols are proposed which overcome all the existing weaknesses and show that privacy of improved protocols are complete and they are resistance against different traceability attacks.
References
More filters
Journal ArticleDOI
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Hung-Yu Chien,Che-Hao Chen +1 more
TL;DR: This paper will point out the weaknesses of two EPC Class 1 GEN-2-conformed security protocols, and then proposes a new protocol, which raises the security level and conforms to the EPC class 1 Gen-2 standards.
Proceedings ArticleDOI
RFID authentication protocol for low-cost tags
Boyeon Song,Chris J. Mitchell +1 more
TL;DR: This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.
Journal ArticleDOI
RFID privacy issues and technical challenges
TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and is not available on IEEE Xplore for these articles.
Book ChapterDOI
An Efficient and Secure RFID Security Method with Ownership Transfer
TL;DR: This paper proposes an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem and provides not only high-security but also high-efficiency.
Journal ArticleDOI
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
TL;DR: This paper will give demonstrations on what have caused weaknesses in the mutual authentication protocol for RFID, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above.
Related Papers (5)
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Hung-Yu Chien,Che-Hao Chen +1 more
Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection
Chin-Ling Chen,Yong-Yuan Deng +1 more