scispace - formally typeset
Journal ArticleDOI

Short communication: Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard

Eun-Jun Yoon
- 01 Jan 2012 - 
- Vol. 39, Iss: 1, pp 1589-1594
TLDR
This paper demonstrates that Yeh et al.'s protocol has two serious security problems such as DATA integrity problem and forward secrecy problem unlike their claims, and proposes an improved protocol which can prevent the security problems and be applied in low-cost RFID environments requiring a high level of security.
Abstract
Radio frequency identification (RFID) technology is taking the place of barcodes to become electronic tags of the new generation. EPC Class 1 Generation 2 has served as the most popular standard for passive RFID tags. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. However, this paper demonstrates that Yeh et al.'s protocol has two serious security problems such as DATA integrity problem and forward secrecy problem unlike their claims. An improved protocol is also proposed which can prevent the security problems and be applied in low-cost RFID environments requiring a high level of security.

read more

Citations
More filters
Journal ArticleDOI

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

TL;DR: A novel RFID authentication protocol based on elliptic curve cryptography is designed, which is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency.
Journal ArticleDOI

Security Analysis and Improvement on Two RFID Authentication Protocols

TL;DR: A passive disclosure attack on RAPLT protocol is presented, and it is demonstrated that SRP ^{++}$$SRP++ protocol can resist the exhaustive search attack with the complexity O(2^{32})$$O(232), which is the optimal security bound.
Book ChapterDOI

Secure Improved Cloud-Based RFID Authentication Protocol

TL;DR: It is shown that the Xie et al. protocol is vulnerable to reader impersonation attacks, location tracking and tag’s data privacy invasion, and the results indicate that the proposed protocol achieves data secrecy and authentication for RFID tags.
Journal ArticleDOI

Improvement of the Hash-Based RFID Mutual Authentication Protocol

TL;DR: This paper further shows that Cho et al.
Journal ArticleDOI

Traceability Analysis of Recent RFID Authentication Protocols

TL;DR: In order to keep and protect the privacy of RFID users, two improved versions of analyzed protocols are proposed which overcome all the existing weaknesses and show that privacy of improved protocols are complete and they are resistance against different traceability attacks.
References
More filters
Journal ArticleDOI

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards

TL;DR: This paper will point out the weaknesses of two EPC Class 1 GEN-2-conformed security protocols, and then proposes a new protocol, which raises the security level and conforms to the EPC class 1 Gen-2 standards.
Proceedings ArticleDOI

RFID authentication protocol for low-cost tags

TL;DR: This paper proposes a new authentication protocol which provides the identified privacy and security features and is also efficient and shows that it requires less tag-side storage and computation than other similarly structured RFID protocols.
Journal ArticleDOI

RFID privacy issues and technical challenges

TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and is not available on IEEE Xplore for these articles.
Book ChapterDOI

An Efficient and Secure RFID Security Method with Ownership Transfer

TL;DR: This paper proposes an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem and provides not only high-security but also high-efficiency.
Journal ArticleDOI

Securing RFID systems conforming to EPC Class 1 Generation 2 standard

TL;DR: This paper will give demonstrations on what have caused weaknesses in the mutual authentication protocol for RFID, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above.
Related Papers (5)