A CRC-Based Lightweight Authentication Protocol for EPCglobal Class-1 Gen-2 Tags
详细信息    查看全文
  • 作者:Zhicai Shi (24) (25)
    Yongxiang Xia (24)
    Yu Zhang (26)
    Yihan Wang (24)
    Jian Dai (24)
  • 关键词:RFID ; authentication protocol ; CRC ; privacy ; security
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2014
  • 出版时间:2014
  • 年:2014
  • 卷:8630
  • 期:1
  • 页码:632-643
  • 全文大小:330 KB
  • 参考文献:1. Nambiar, A.N.: RFID Technology: A Review of its Applications. In: Proceedings of the World Congress on Engineering and Computer Science, vol.?II, pp. 1-. IAENG, Hong Kong (2009)
    2. Gao, L.J., Ma, M.D., Shu, Y.T., Wei, Y.H.: An Ultralightweight RFID Authentication Protocol with CRC and Permutation. Journal of Network and Computer Applications?10, 1-0 (2013)
    3. Kang, S.Y., Lee, D.G., Lee, I.Y.: A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environment. Computer Communications?31, 4248-254 (2008) CrossRef
    4. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.?2802, pp. 201-12. Springer, Heidelberg (2004) CrossRef
    5. Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces?29, 254-59 (2007) CrossRef
    6. Karthikeyan, S., Nesterenko, M.: RFID Security without Extensive Cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63-7. ACM, New York (2005) CrossRef
    7. Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of Class 1 GEN-2 RFID Tag against Traceability and Cloning. In: The 2006 Symposium on Cryptography and Information Security, pp. 269-77. Springer, Heidelberg (2006)
    8. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. Computer Standards & Interfaces?31, 372-80 (2009) CrossRef
    9. Han, D., Kwon, D.: Vulnerability of an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces?31, 648-52 (2009) CrossRef
    10. Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol.?4809, pp. 43-6. Springer, Heidelberg (2007) CrossRef
    11. Hu, T., Wei, G.H.: Anonymous Bidirectional RFID Authentication Protocol Based on Low-cost Tags. Journal of Computer Applications?32(1), 111-14 (2012)
    12. Oh, S., Shin, J., Jeong, C., Lee, J.: A Mutual Authentication Protocol in RFID Using CRC and Variable Certification Key. In: 2012 International Conference on Affective Computing and Intelligent Interaction. Lecture Notes in Information Technology, vol.?10, pp. 84-9. Springer, Heidelberg (2012)
  • 作者单位:Zhicai Shi (24) (25)
    Yongxiang Xia (24)
    Yu Zhang (26)
    Yihan Wang (24)
    Jian Dai (24)

    24. School of Electronic&Electrical Engineering, Shanghai University of Engineering Science, Shanghai, 201620, P.R. China
    25. Department of Computing, Macquarie University, Sydney, 2109, Australia
    26. Sino-Korean School of Multi-media, Shanghai University of Engineering Science, Shanghai, 201620, P.R. China
  • ISSN:1611-3349
文摘
Authentication is one of the most important technologies to protect the privacy and security of RFID systems. The EPCglobal Class-1 Gen-2 specification is an important standard for RFID. The tags conforming to this standard have limited computing and store resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. But this kind of tags is considered as the main stream for RFID applications. In order to solve the secure problems for this kind of RFID tags we propose a lightweight authentication protocol based on CRC, which can assure forward security and prevent information leakage, location tracing, eavesdropping, DOS attack, replay attack, and spoofing. This protocol avoids CRC collision by reasonably dividing the tag’s identification information into two different parts and it enhances the mutual authentication strength between tags and readers by dual authentications. This protocol only uses the computing resources embedded in tags and it is very suitable to low-cost RFID systems.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700