{"title":"基于EPC C1G2的RFID标签安全访问控制协议","authors":"Zhongwen Li, Cheng-Bin Wu, Yi Xie, Zheng-Wei Jing","doi":"10.1109/ICMLC.2012.6358979","DOIUrl":null,"url":null,"abstract":"The weak security capability of RFID systems has greatly hindered the development of RFID applications in the Internet of things. EPC C1G2 has many security risks, such as the plain-text transmission of tag information, the easily compromised passwords, and the shortage of tag authentication. Some studies on designing security protocols for RFID tags either do not conform to EPC C1G1 or suffer from security flaws. After analyzing the existing security protocols, this paper designs a secure access control protocol of RFID tags. The analysis results have showed that the proposed protocol meet the security requirements of RFID systems based on EPC C1G2.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A secure access control protocol of RFID tags based on EPC C1G2\",\"authors\":\"Zhongwen Li, Cheng-Bin Wu, Yi Xie, Zheng-Wei Jing\",\"doi\":\"10.1109/ICMLC.2012.6358979\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The weak security capability of RFID systems has greatly hindered the development of RFID applications in the Internet of things. EPC C1G2 has many security risks, such as the plain-text transmission of tag information, the easily compromised passwords, and the shortage of tag authentication. Some studies on designing security protocols for RFID tags either do not conform to EPC C1G1 or suffer from security flaws. After analyzing the existing security protocols, this paper designs a secure access control protocol of RFID tags. The analysis results have showed that the proposed protocol meet the security requirements of RFID systems based on EPC C1G2.\",\"PeriodicalId\":128006,\"journal\":{\"name\":\"2012 International Conference on Machine Learning and Cybernetics\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Machine Learning and Cybernetics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMLC.2012.6358979\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Machine Learning and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLC.2012.6358979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure access control protocol of RFID tags based on EPC C1G2
The weak security capability of RFID systems has greatly hindered the development of RFID applications in the Internet of things. EPC C1G2 has many security risks, such as the plain-text transmission of tag information, the easily compromised passwords, and the shortage of tag authentication. Some studies on designing security protocols for RFID tags either do not conform to EPC C1G1 or suffer from security flaws. After analyzing the existing security protocols, this paper designs a secure access control protocol of RFID tags. The analysis results have showed that the proposed protocol meet the security requirements of RFID systems based on EPC C1G2.