Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

被引:65
作者
Chen, Chin-Ling [1 ]
Deng, Yong-Yuan [1 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Wufong Township, Taiwan
关键词
RFID; EPC; Security; Privacy; Mutual authentication; SECURITY;
D O I
10.1016/j.engappai.2008.10.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio frequency identification (RFID) technology has recently aroused great interest due to its convenience and economic efficiency. Through RFID become popular worldwide, it is susceptible to various attacks and security problems. Since RFID systems use wireless transmission, user privacy may be compromised by malicious people intercepting the information contained in the RFID tags. Many of the methods previously proposed to prevent such attacks do not adequately protect privacy or reduce database loading. In this paper, we propose a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers. Our scheme not only reduces database loading, but also ensures user privacy. Finally, we survey our scheme from several security viewpoints, and prove its feasibility for use in several applications. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1284 / 1291
页数:8
相关论文
共 18 条
[1]   RFID technologies: Supply-chain applications and implementation issues [J].
Angeles, R .
INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (01) :51-65
[2]   Security implications in RFID and authentication processing framework [J].
Ayoade, J .
COMPUTERS & SECURITY, 2006, 25 (03) :207-212
[3]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[4]  
Dimitriou T., 2005, IEEE INT C SEC PRIV
[5]  
*EPC, 2008, EPC EL PROD COD CLAS
[6]  
Gao XX, 2004, PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, P164
[7]  
GARFINKEL SL, 2005, RFID PRIVACY OVERVIE, P34
[8]  
Juels A., 2003, P 10 ACM C COMPUTER, P103
[9]  
Karkkainen M., 2003, INT J RETAIL DISTRIB, V31, P529, DOI DOI 10.1108/09590550310497058
[10]  
Karthikeyan S., 2005, P 3 ACM WORKSHOP SEC, P63