skip to main content
10.1145/1516241.1516280acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Secure RFID authentication scheme for EPC class Gen2

Published: 15 February 2009 Publication History

Abstract

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, this paper propose a secure authentication scheme based on EPC Class Gen-2 The Proposed scheme is a secure authentication protocol for complementing the weak security points of the existing schemes.

References

[1]
Avoine G., and Oechslin P., "RFID Traceability: A Multilayer Problem," Financial Cryptography - FC'05, LNCS, Springer, 2005.
[2]
Bono, S., Green, M., Stubblefield, A., Julels, A., Rubin, A., and Szydlo, M., "Security Analysis of a Cryptographically-Enabled RFID Device," In USENIX Security, 2005. (Available at http://rfidanalysis.org/.)
[3]
Bringer J., Chabanne H., and Dottax E., "HB++: a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006.
[4]
Dimitriou T., "A lightweight rfid protocol to protect against traceability and cloning attacks," IEEE, SECURECOMM, 2005.
[5]
D. N. Duc, J. Park, H. Lee and K. Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning," The 2006 Symposium on Cryptography and Information Security, 2006.
[6]
Gilbert, H., Sibert, H., and Robshaw, M., "An Active Attack Against a Provably Secure Lightweignt Authentication Protocol," Preliminary Version, 2005.
[7]
Henrici D., and Paul M., "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," PerSee'04 at IEEE PerCom. pp. 149~153, 2004.
[8]
Hung-Yu Chien and Che-Hao Chen, "Mutula authentication protocol for RFID conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, Vol 29, pp254--259, Feb., 2007.
[9]
Jeong-kyu Y., Ren K., and Kwan-gio K., "Security and Privacy on Authentication Protocol for Low-cost RFID," Symposium on Cryptography and Information Security, Jan., 2005.
[10]
Jules A., and Pappu R., Squealing E., "Privacy protection in RFID-enabled bank-notes, In processing of Financial Cryptography," FC'03, vol.2742 LNCS, pp.103~121, Sep 2003.
[11]
Juels A., "Minimalist cryptography for Low-Cost RFID Tag," In The Fourth International Conference on Security in Communication Networks-SCN 2004, vol. 3352 LNCS, pp.149~164, Sep 2004.
[12]
Juels A., "Authentication Pervasive Devices with Human Protocols," Crypto 2005, Aug 205.
[13]
Junichiro S., Jae-Cheol R and Kouichi S., "Enhancing privacy of Universal Re-encryption scheme for RFID Tags," EUC 2004, Vol. 3207 LNCS, pp.879~890, Dec 2004.
[14]
Katz J., and Ji-Sun S., "Prallel and Concurrent Security of the HB and HB+ Protocols," Cryptology ePrint Archive: Report 2005/461 (to appear in the preceedings of Eurocrypt 2006).
[15]
MIT Auto-ID Center. http://www.autoidcenter.org
[16]
Ohkubo M., Suzuki K., and Kinoshita S., "Cryptographic Approach to "Privacy-Friendly" Tag" RFID Privacy Workshop@MIT, Nov, 2003.
[17]
RFID Journal. Gillette to Phurchase 500 Millin EPC Tags, http://www.rfidjournal.com
[18]
S. Karthikeyan and M. Nesterenko, "RFID security without extensive cryptography," ACM workshop on Security of Ad Hoc and Sensor Networks (2005), pp 63--67. 2005.
[19]
Su-Mi L., Young-Ju H., Dong-Hoon L., and Jong L., "Efficient Authentication for Low-Cost RFID systems," ICCSA05, vol. 3480 LCNS, pp.619~629, May 2005.
[20]
Stephen A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Masters Thesis. MIT. May, 2003.
[21]
Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spc-rfid.pdf
[22]
Sanjay E. Sarma, "Towards the five-cent Tag", Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org
[23]
http://www.cs.fsu.edu/~burmeste/135.pdf

Cited By

View all
  • (2017)Strengthening Indian Border Security through Integrated ICT based FrameworkProceedings of the Special Collection on eGovernment Innovations in India10.1145/3055219.3055225(39-44)Online publication date: 7-Mar-2017
  • (2017)An ICT-based Border Security FrameworkProceedings of the 10th International Conference on Theory and Practice of Electronic Governance10.1145/3047273.3047347(35-38)Online publication date: 7-Mar-2017
  • (2014)Emulation based fault injection on UHF RFID transponder17th International Symposium on Design and Diagnostics of Electronic Circuits & Systems10.1109/DDECS.2014.6868802(254-257)Online publication date: Apr-2014
  • Show More Cited By

Index Terms

  1. Secure RFID authentication scheme for EPC class Gen2

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
    February 2009
    704 pages
    ISBN:9781605584058
    DOI:10.1145/1516241
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 February 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RFID
    2. authentication
    3. security

    Qualifiers

    • Research-article

    Conference

    ICUIMC '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Strengthening Indian Border Security through Integrated ICT based FrameworkProceedings of the Special Collection on eGovernment Innovations in India10.1145/3055219.3055225(39-44)Online publication date: 7-Mar-2017
    • (2017)An ICT-based Border Security FrameworkProceedings of the 10th International Conference on Theory and Practice of Electronic Governance10.1145/3047273.3047347(35-38)Online publication date: 7-Mar-2017
    • (2014)Emulation based fault injection on UHF RFID transponder17th International Symposium on Design and Diagnostics of Electronic Circuits & Systems10.1109/DDECS.2014.6868802(254-257)Online publication date: Apr-2014
    • (2014)An Approach to Solve Tracking and Message Blocking Problems in RFIDProceedings of the 2014 Fourth International Conference on Communication Systems and Network Technologies10.1109/CSNT.2014.241(1187-1191)Online publication date: 7-Apr-2014
    • (2013)Device-Level ExtensionsReal-time Security Extensions for EPCglobal Networks10.1007/978-3-642-36343-6_4(61-70)Online publication date: 22-Jun-2013
    • (2012)Secure RFID-Enablement in Modern CompaniesHandbook of Research on Industrial Informatics and Manufacturing Intelligence10.4018/978-1-4666-0294-6.ch022(507-539)Online publication date: 2012
    • (2012)Attacks and improvements on the RFID authentication protocols based on matrixJournal of Electronics (China)10.1007/s11767-013-2116-430:1(33-39)Online publication date: 20-Dec-2012
    • (2011)A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 StandardAdvanced Materials Research10.4028/www.scientific.net/AMR.403-408.1845403-408(1845-1848)Online publication date: Nov-2011
    • (2011)Lightweight RFID authentication with forward and backward securityACM Transactions on Information and System Security10.1145/1952982.195299314:1(1-26)Online publication date: 6-Jun-2011
    • (2011)Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chainsPersonal and Ubiquitous Computing10.1007/s00779-011-0390-416:3(271-289)Online publication date: 4-Jun-2011
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media