Securing RFID systems conforming to EPC Class 1 Generation 2 standard

被引:85
作者
Yeh, Tzu-Chang [1 ]
Wang, Yan-Jun [1 ]
Kuo, Tsai-Chi [2 ]
Wang, Sheng-Shih [1 ]
机构
[1] Minghsin Univ Sci & Technol, Dept Informat Management, Hsinchu, Taiwan
[2] Minghsin Univ Sci & Technol, Dept Ind Engn & Management, Hsinchu, Taiwan
关键词
RFID; Security; Gen; 2; Privacy; Authentication; AUTHENTICATION PROTOCOL;
D O I
10.1016/j.eswa.2010.04.074
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID, capable of remote automatic identification, is taking the place of barcodes to become electronic tags of the new generation. However, the information transmitted in the air could easily be intercepted and eavesdropped due to its radio transmission nature. On top of this, its prevalence has brought the stress on its security and privacy issues. EPC Class 1 Generation 2 (Gen 2) has served as the most popular standard for passive tags. Passive tags possess limited computation ability and capacity that just makes designing of the security protocol even more challenging. Researchers have proposed quite a few security protocols for RFID, but most of them are just too complicated to be implemented on Gen 2. Chien and Chen (2007) proposed a mutual authentication protocol conforming to this standard. However, it is found vulnerable to DoS attacks. Due to the bad properties of the CRC function used in the protocol, the claimed security objectives are also not met. Moreover, the database must use brute search for each tag's authentication. This paper will give demonstrations on what have caused these weaknesses, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above. The improved protocol could thus be applied in high security demanding environments. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:7678 / 7683
页数:6
相关论文
共 25 条
[1]  
*ABI RES, 2007, RFID PASS LAB MARK E
[2]  
*ABI RES, 2009, TOT RFID REV EXC 5 6
[3]  
*ABI RES, 2007, RFID MARK STAY STRON
[4]  
*ABI RES, 2008, ABI RES RFID IND WOR
[5]  
[Anonymous], 2007, RFID J
[6]  
BAARD M, 2007, RFID GIVES BUSINESSE
[7]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[8]  
Diorio C., 2007, RFID J
[9]  
Duc D., 2006, 2006 Symposium on Cryptography and Information Security, P17
[10]  
ELISSON C, 2000, COMPUTER SECURITY J, V16, P1