2009
DOI: 10.1016/j.engappai.2008.10.022
|View full text |Cite
|
Sign up to set email alerts
|

Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
75
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 91 publications
(75 citation statements)
references
References 12 publications
0
75
0
Order By: Relevance
“…In this section we consider three recently proposed EPCGen2 compliant protocols: the Chen-Deng mutual authentication protocol [7], the Quingling-YijuYonghua minimalist mutual authentication protocol [17], and the Sun-Ting authentication protocol [18]. We show that these protocols fall short of their claimed security.…”
Section: Weaknesses In Recently Proposed Epcgen2 Compliant Rfid Protomentioning
confidence: 99%
See 2 more Smart Citations
“…In this section we consider three recently proposed EPCGen2 compliant protocols: the Chen-Deng mutual authentication protocol [7], the Quingling-YijuYonghua minimalist mutual authentication protocol [17], and the Sun-Ting authentication protocol [18]. We show that these protocols fall short of their claimed security.…”
Section: Weaknesses In Recently Proposed Epcgen2 Compliant Rfid Protomentioning
confidence: 99%
“…In the Chen-Deng mutual authentication protocol [7] each tag T shares three private values with the back-end server S: a key K, a value (incorrectly called nonce) N and an EPC identifier. The tag stores these in non-volatile memory and the server stores them in a database DB.…”
Section: Analysis Of the Chen-deng Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…So the Chien et al's protocol not only is vulnerable to such attacks, but also does not provide tag privacy. Chen and Deng [10] proposed an EPC-friendly mutual authentication scheme by using a pseudo-random number generator (PRNG) and CRC which is conformed to the EPC-C1G2 standard. Their protocol tried to apply CRC as cryptographic hash function for message authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Motivated by the release of EPC-C1G2 specification, some researchers have recently proposed a lot of schemes [7][8][9][10][11] trying to solve the practical problems due to the fact that the EPC-C1G2 only provides a low security level. In this section, we will summarize some related proposals in this field.…”
Section: Related Workmentioning
confidence: 99%