Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard

@article{PerisLpez2009CryptanalysisOA,
  title={Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard},
  author={Pedro Peris-L{\'o}pez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan E. Tapiador and Arturo Ribagorda},
  journal={Computer Standards & Interfaces},
  year={2009},
  volume={31},
  pages={372-380}
}
In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by EPCglobal and ISO. This standard can be considered as a ''universal'' specification for low-cost RFID tags. Although it represents a great advance for the consolidation of RFID technology, it does not pay due attention to security and, as expected, its security level is very low. In 2007, Chien et al. published a mutual authentication protocol conforming to EPC-C1G2 which tried to correct all its security… CONTINUE READING
BETA

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 60 CITATIONS, ESTIMATED 84% COVERAGE

Ultralightweight RFID Reader-Tag Mutual Authentication

  • 2015 IEEE 39th Annual Computer Software and Applications Conference
  • 2015
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Hash function based on multiple input signature analysis registers and the application in EPC C1G2 tag

  • 2012 IEEE 14th International Conference on Communication Technology
  • 2012
VIEW 11 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

  • Computer Standards & Interfaces
  • 2009
VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Lightweight Anonymous RFID Group Ownership Transfer Protocol in Multi-owner Environment

  • 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2008
2017

CITATION STATISTICS

  • 6 Highly Influenced Citations

References

Publications referenced by this paper.
SHOWING 1-10 OF 25 REFERENCES

RFID tag-reader mutual authentication scheme utilizing tag's access

D. M. Konidala, K. Kim
  • Auto-ID Labs White Paper WP-HARDWARE-033
  • 2007
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers

  • IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
  • 2004
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme

  • IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference
  • 2007
VIEW 1 EXCERPT