A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard

Guiyue Jin, Jiyu Jin, Xueheng Tao, Baoying Li
{"title":"A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard","authors":"Guiyue Jin, Jiyu Jin, Xueheng Tao, Baoying Li","doi":"10.1109/APSCC.2012.18","DOIUrl":null,"url":null,"abstract":"The low cost RFID tags can be applied in new applications\", \"and interest more different groups of suppliers and end users, But the most important problem of low cost RFID system is that unauthorized readers can access to tag information and illegal tags can be authorized by legal readers, which should be potential to produce privacy and security problem. EPC Class1 Gen2 standard can be considered as a universal specification for low cost RFID tags, but it does not pay more attention to security. Recently some compliant to low cost RFID tags authentication protocols are proposed in the literature, but many of them do not guarantee security and privacy. Those protocols do not consider that the tags' electronic product code usually has 96 bits, and directly use 16 bit CRC and 16-bit PRNG, so it does not guarantee the unequivocal identification of tagged items. Our protocol not only overcomes the weakness of the previous proposed protocols to guarantee the security and privacy, but also reduces database searching time and guarantees the synchronization between the readers and the tags. Furthermore, we analyze the proposed protocol in terms of security and performance, and it shows that the proposed protocol is effective and efficient.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Asia-Pacific Services Computing Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSCC.2012.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The low cost RFID tags can be applied in new applications", "and interest more different groups of suppliers and end users, But the most important problem of low cost RFID system is that unauthorized readers can access to tag information and illegal tags can be authorized by legal readers, which should be potential to produce privacy and security problem. EPC Class1 Gen2 standard can be considered as a universal specification for low cost RFID tags, but it does not pay more attention to security. Recently some compliant to low cost RFID tags authentication protocols are proposed in the literature, but many of them do not guarantee security and privacy. Those protocols do not consider that the tags' electronic product code usually has 96 bits, and directly use 16 bit CRC and 16-bit PRNG, so it does not guarantee the unequivocal identification of tagged items. Our protocol not only overcomes the weakness of the previous proposed protocols to guarantee the security and privacy, but also reduces database searching time and guarantees the synchronization between the readers and the tags. Furthermore, we analyze the proposed protocol in terms of security and performance, and it shows that the proposed protocol is effective and efficient.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
符合EPC Class1 Gen2标准的RFID全尺寸认证协议
低成本的RFID标签可以应用于新的应用领域,并吸引更多不同的供应商和终端用户群体,但低成本RFID系统最重要的问题是未经授权的读取器可以访问标签信息,非法标签可以由合法的读取器授权,这应该是潜在的隐私和安全问题。EPC Class1 Gen2标准可以认为是低成本RFID标签的通用规范,但对安全性的关注不够。近年来,文献中提出了一些符合低成本RFID标签的认证协议,但其中许多协议不能保证安全性和隐私性。这些协议没有考虑到标签的电子产品代码通常为96位,直接使用16位的CRC和16位的PRNG,因此不能保证标签物品的明确识别。我们的协议不仅克服了以往协议的缺点,保证了安全性和隐私性,而且减少了数据库搜索时间,保证了阅读器和标签之间的同步。进一步从安全性和性能两方面对所提出的协议进行了分析,结果表明所提出的协议是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Reform and Exploration of the Computer Graphics A Peer-to-Peer Massive Battle Observing System to Support Game Live A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application Research on the Effect of Business Models on Enterprise Performance: Based on Information Technology Industry Listed Companies in China Business Process Compositions Preserving k-Soundness Property
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1