Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication 2009
DOI: 10.1145/1516241.1516280
|View full text |Cite
|
Sign up to set email alerts
|

Secure RFID authentication scheme for EPC class Gen2

Abstract: Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, this paper propose a secure authentication scheme based on EPC Class Gen-2 The Proposed scheme is a secure authentication protocol for complementing the weak security points of the existing schemes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Recently, several RFID authentication protocols specifically designed for compliance with the EPCGen2 standard have been proposed: [Chen and Deng 2009;Qingling et al 2008;Sun and Ting 2009;Seo et al 2005;Choi et al 2009]. These combine the CRC16 of EPCGen2 with its 16-bit PRNG to hash, randomize, and link protocol flows.…”
Section: The Epcgen2 Standardmentioning
confidence: 99%
“…Recently, several RFID authentication protocols specifically designed for compliance with the EPCGen2 standard have been proposed: [Chen and Deng 2009;Qingling et al 2008;Sun and Ting 2009;Seo et al 2005;Choi et al 2009]. These combine the CRC16 of EPCGen2 with its 16-bit PRNG to hash, randomize, and link protocol flows.…”
Section: The Epcgen2 Standardmentioning
confidence: 99%
“…In contrast to an on-premise solution, an on-demand solution requires the transfer of data via the Internet for both reading and writing data from/to the tags. Since the service provider of the on-demand solution is aware of this threat, it is possible to react by establishing dedicated securing mechanisms, e.g., the use of HTTPS or VPNs for exchanging data [52]. We assume the topic of secured data exchange as being well understood and therefore we do not discus it in further detail.…”
Section: Threat Assessment For Participants Of Rfid-aided Supply Chainsmentioning
confidence: 99%
“…attacks [7,8]. Seo et al [9] propose the Program I and Program II Protocol according to GEN-2 standard. In Program I, the tag tries to send the authentication message without the random number to the reader, and the random number is generated by the tag, so it can not against replay attack.…”
mentioning
confidence: 99%