Loading...
Cryptanalysis of two EPC-based RFID security schemes
Abdolmaleki, B ; Sharif University of Technology
476
Viewed
- Type of Document: Article
- DOI: 10.1109/ISCISC.2015.7387908
- Publisher: Institute of Electrical and Electronics Engineers Inc
- Abstract:
- Radio Frequency Identification (RFID) is an easy to use technology for quick and low-cost identification and authentication. Since RFID systems have found in various parts of our daily lives, security awareness about these systems has become one of the prominent topics for researchers. In this study, we investigate two RFID security schemes which both are under Electronic Product Code (EPC) standard. It is shown that both the analyzed protocols have some drawbacks and are vulnerable to several security attacks including secret parameters reveal, impersonation, reader forward secrecy and also one of them does not provide date integrity. In addition, in order to overcome all the discovered weaknesses, we propose some modifications and propose a modified version of each one
- Keywords:
- Attacks ; EPC C1 G2 standard ; RFID authentication protocols ; Security ; Authentication ; Cryptography ; Identification (control systems) ; Security of data ; Electronic product codes ; Forward secrecy ; RFID authentication protocols ; Secret parameters ; Security attacks ; Security awareness ; Radio frequency identification (RFID)
- Source: 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 116-121 ; 9781467376099 (ISBN)
- URL: http://ieeexplore.ieee.org/document/7387908