Title
A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard
Abstract
The low cost RFID tags can be applied in new applications", "and interest more different groups of suppliers and end users, But the most important problem of low cost RFID system is that unauthorized readers can access to tag information and illegal tags can be authorized by legal readers, which should be potential to produce privacy and security problem. EPC Class1 Gen2 standard can be considered as a universal specification for low cost RFID tags, but it does not pay more attention to security. Recently some compliant to low cost RFID tags authentication protocols are proposed in the literature, but many of them do not guarantee security and privacy. Those protocols do not consider that the tags' electronic product code usually has 96 bits, and directly use 16 bit CRC and 16-bit PRNG, so it does not guarantee the unequivocal identification of tagged items. Our protocol not only overcomes the weakness of the previous proposed protocols to guarantee the security and privacy, but also reduces database searching time and guarantees the synchronization between the readers and the tags. Furthermore, we analyze the proposed protocol in terms of security and performance, and it shows that the proposed protocol is effective and efficient.
Year
DOI
Venue
2012
10.1109/APSCC.2012.18
APSCC
Keywords
Field
DocType
data privacy,epc class1 gen2,data privacy problem,low cost rfid system,low cost rfid tags,authentication protocol,word length 16 bit,word length 96 bit,class1 gen2 standard,prng,crc,tag electronic product code,epc class 1 gen2 standard,radiofrequency identification,synchronization,rfid tags,cryptographic protocols,important problem,telecommunication security,low cost rfid tag,previous proposed protocol,proposed protocol,security problem,full scale authentication protocol,synchronisation,epc class1 gen2 standard,bit crc,16-bit prng
Synchronization,Authentication,Cryptographic protocol,End user,Computer science,Computer security,Server,Computer network,Authentication protocol,Information privacy,Electronic Product Code
Conference
ISBN
Citations 
PageRank 
978-1-4673-4825-6
0
0.34
References 
Authors
0
4
Name
Order
Citations
PageRank
Guiyue Jin174.47
Jiyu Jin255.58
Xueheng Tao321.40
Baoying Li400.34