Loading...

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard

Abdolmaleki, B ; Sharif University of Technology | 2017

448 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISTEL.2016.7881793
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2017
  4. Abstract:
  5. Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their protocol suffers from secret parameters reveal, tag impersonation attack, backward and forward traceability attacks. Then, in order to enhance the security and the privacy of this protocol, a modified version is proposed. In order to evaluate our proposed protocol, its security and privacy are analyzed. Furthermore, the proposed protocol is compared with some similar protocols in the terms of security and privacy. It is shown that the proposed protocol is secure against various attacks and also provides user privacy. © 2016 IEEE
  6. Keywords:
  7. EPC C1 G2 standard ; Privacy ; Aluminum ; Authentication ; Data privacy ; Authentication protocols ; Impersonation attack ; Mutual authentication protocols ; RFID authentication protocols ; Secret parameters ; Security ; Security and privacy ; Traceability attacks ; Radio frequency identification (RFID)
  8. Source: 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 111-116 ; 9781509034345 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/7881793