Abstract
Radio Frequency Identification (RFID) is taking place of barcodes in our lives, thanks to its remote identification capability. However, being transmitted via radio waves, the information is exposed to many possible attacks, which may endanger the security and privacy of relevant individuals and organizations. Fortunately, there have been efforts to construct an efficient and secure protocol in conformance with EPC Class 1 Generation 2 Standard (Gen 2), the most popular standard for RFID passive tags. Yeh et al. proposed a mutual authentication protocol conforming Gen 2. However, the proposed protocol is found to be vulnerable to an attack. Thus, in this paper, we show the vulnerability of Yeh et al.’s protocol and propose countermeasures to secure the protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications 37, 7678–7683 (2010)
Chien, H.Y., Chen, C.H.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces 29, 254–259 (2007)
Lyu, J., Chang, S.Y., Chen, T.L.: Integrating RFID with quality assurance system – Framework and applications. Expert Systems with Applications 36, 10877–10882 (2009)
ABI Research, http://www.abiresearch.com
EPCglobal, http://www.EPCglobalinc.org
Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: Proc. of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67 (2005)
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning. In: Proc. of the 2006 Symposium on Cryptography and Information Security, pp. 17–20 (2006)
Choo, K.K.R.: Key Establishment: Proofs and Refutations. Ph.D. Thesis, Queensland University of Technology (2006)
van Deursen, T., Radomirović, S.: Algebraic attacks on RFID protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. LNCS, vol. 5746, pp. 38–51. Springer, Heidelberg (2009)
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Nam, J., Paik, J., Kang, H., Kim, U., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communication Letters 13(3), 205–207 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, C., Park, S., Lee, K., Won, D. (2011). An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Lecture Notes in Computer Science, vol 6935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24082-9_60
Download citation
DOI: https://doi.org/10.1007/978-3-642-24082-9_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24081-2
Online ISBN: 978-3-642-24082-9
eBook Packages: Computer ScienceComputer Science (R0)