2014
DOI: 10.1016/j.jnca.2013.06.002
|View full text |Cite
|
Sign up to set email alerts
|

KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems

Abstract: International audienceThe EPC Class-1 Generation-2 (Gen2 for short) is a Radio Frequency IDentification (RFID) technology that is gaining a prominent place in several domains. However, the Gen2 standard lacks verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of applications based on the Gen2 technology. To address this problem, RFID tags must be equipped with a robust mechanism to authenticate readers before authorising them to access their data. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 10 publications
(22 citation statements)
references
References 70 publications
0
22
0
Order By: Relevance
“…This allows readers to use efficiently the limited bandwidth, e.g., target only a particular tag population or switch off completely some readers. Finally, as RFID communication protocols support dedicated privacy enhancing features [22], the RFID middleware will also need to support their use.…”
Section: Introductionmentioning
confidence: 99%
“…This allows readers to use efficiently the limited bandwidth, e.g., target only a particular tag population or switch off completely some readers. Finally, as RFID communication protocols support dedicated privacy enhancing features [22], the RFID middleware will also need to support their use.…”
Section: Introductionmentioning
confidence: 99%
“…In the first levels of the RFID architecture, three types of data deserve to be considered with security and privacy aspects. We note the reader and tag events [40], the middleware events and the EPCIS data, after events have been captured and stored (cf. Figure 1 shows a summary view of the EPCglobal architecture).…”
Section: Related Workmentioning
confidence: 99%
“…This also allows readers to use efficiently the limited bandwidth, e.g., to target only a particular tag population or switch off completely some readers. Finally, as RFID communication protocols use dedicated privacy enhancing features [40], the RFID middleware will also need to support their use. For instance, the RFID middleware must provide the right kill -password to the right reader to apply it on the tag as specified in EPC standard.…”
Section: Introductionmentioning
confidence: 99%
“…These cases show the lack of formality during the verification phase of new security techniques for low-cost RFID technologies. In [37], we deepened on this problem and illustrated how a sample protocol for the EPC Gen2 RFID technology shall be formally specified with regard to its security requirements. We defined a sample key establishment protocol, and formally verified its conformity to security properties such as authenticity and secrecy.…”
Section: Efforts Conducted Within the Scope Of The Ares Projectmentioning
confidence: 99%