LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Peris-Lopez, Pedro; Li, Tieyan; Hernandez-Castro, Julio C. (2010)
Languages: English
Types: Article
Subjects: QA75
In 2006 EPCglobal and the International Organization for Standards (ISO) ratified the EPC Class-1 Generation-2 (Gen-2) [1] and the ISO 18000-6C standards [2], respectively. These efforts represented major advancements in the direction of universal standardization for low-cost RFID tags. However, a cause for concern is that security issues do not seem to be properly addressed. In this paper, we propose a new lightweight RFID tag-reader mutual authentication scheme for use under the EPCglobal framework. The scheme is based on previous work by Konidala and Kim [3]. We attempt to mitigate the weaknesses observed in the original scheme and, at the same time, consider other possible adversarial threats as well as constraints on low-cost RFID tags requirements.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.2.0, 2008.
    • [2] International Organization for Standards (ISO), ISO/IEC 18000-6: Radio frequency identification for item management - Part 6: Parameters for air interface communications at 860 MHz to 960 MHz.
    • [3] D. M. Konidala and K. Kim, “RFID tag-reader mutual authentication scheme utilizing tag's access password”, AutoID Labs, White Paper WP-HARDWARE-033, 2007.
    • [4] D. N. Duc, J. Park, H. Lee, K. Kim, “Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning”, in Proc. of the Symposium on Cryptography and Information Security, 2006.
    • [5] H. Y. Chien, C. H. Chen, “Mutual authentication protocol for RFID conforming to EPC Class 1 Gen 2 standards”, in Computer Standards & Interfaces, vol. 29(2), pp. 254 - 259, 2007.
    • [6] A. Juels, “RFID security and privacy: a sesearch survey”, in IEEE Journal on Selected Areas in Communications, vol. 24(2), pp. 381-394, Feb. 2006.
    • [7] A. Mitrokotsa, M. R. Rieback and A. S. Tanenbaum, “Classification of RFID Attacks”, in Proceedings of the 2nd International Workshop on RFID Technology, 2008.
    • [8] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. EstevezTapiador, and A. Ribagorda. “RFID Specification Revisited”. Book Chapter in The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems, 6:pp.127156. Auerbach Publications, Taylor & Francis Group, 2008.
    • [9] T. L. Lim, and T. Li, “Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme”, in Proc. of IEEE Globecom, Nov. 2007.
    • [10] D. Bailey and A. Juels. “Shoehorning security into the EPC standard”. In International Conference on Security in Communication Networks - SCN'06, volume 4116 of LNCS, pp. 303-320. Springer-Verlag, September 2006.
    • [11] S. Karthikeyan, M. Nesterenko, “RFID security without extensive cryptography”, in Proc. of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63-67, 2005.
    • [12] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. EstevezTapiador, and A. Ribagorda. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard, in Hand. of RFIDsec'07, July 2007.
    • [13] M. Burmester, B. de Medeiros, J. Munilla and A. Peinado. “Secure EPC Gen2 compliant Radio Frequency”, in Cryptology ePrint Archive, Report 2009/149 http://eprint. iacr.org/, 2009.
    • [14] P. Peris-Lopez, J. C. Hernandez-Castro, J.M. EstevezTapiador, T. Li, and J. C.A. van der Lubbe. “Weaknesses in two recent lightweight RFID authentication protocols”, in Hand. of RFIDSec '09, July 2009.
    • [15] D. M. Konidala, Z. Kim, and K. Kim, “A simple and costeffective RFID tag-reader mutual authentication scheme”, in Proc. of RFIDSec'07, pp. 141-152, July 2007.
    • [16] P. Peris-Lopez, T. Li, T. L. Lim, J. C. Hernandez-Castro and J. M. Estevez-Tapiador. “Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class1 Generation-2 Standard”, in Hand. of RFIDSec'08, July 2008.
    • [17] T. L. Lim, T. Li. “Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme”, in Proc. of IEEE PIMRC, Sep. 2008.
    • [18] T. Lohmmann, M. Schneider, and C. Ruland, “Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags”, in Proc. of CARDIS'06, vol. 3928 of LNCS, pp. 278-288, 2006.
    • [19] J. R. Koza, “Evolving a computer program to generate random number using the genetic programming paradigm”, in Proc. of the 4th Int'l Conf. on Genetic Algorithms, 1991.
    • [20] A Klimov and A. Shamir. “Cryptographic applications of T-functions”. In Proc. of SAC'03, volume 3006 of LNCS, pp. 248-261. Springer-Verlag, 2003.
    • [21] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, and A. Ribagorda. “Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol”, in Workshop on Information Security Applications, Volume 5379 of LNCS, pages 56-68. Springer-Verlag, September 23- 25, 2008.
    • [22] J. C. Hernandez-Castro, J. M. Estevez-Tapiador, A. Ribagorda-Garnacho, B. Ramos-Alvarez, “Wheedham: an automatically designed block cipher by means of genetic programming”, in Proc. of CEC '06, pp. 192-199, 2006.
    • [23] David Sexton, Randomness Analysis of Konton2, http:// www.geocities.com/da5id65536, 2005.
    • [24] M. Hell, T. Johansson, W. Meier. “Grain - a stream cipher for constrained enviroments”. in Proc. of RFIDSec'05, 2005.
    • [25] M. Feldhofer, J. Wolkerstorfer, V. Rijmen. “AES implementation on a grain of sand”. in Proc. on Information Security, vol. 152, pp. 13-20. IEEE Computer Society, 2005.
    • [26] M. Lehtonen, et al., “Networked RFID systems and lightweight cryptography”, in Chapter from identification to authentication - A review of RFID product authentication techniques, pp. 169-187. Springer, 2007.
    • [27] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. EstevezTapiador, and A. Ribagorda. “LAMED A PRNG for EPC Class-1 Generation-2 RFID Specification”, in Computer Standards & Interfaces, Vol. 31(1), pp. 88-97, January 2009.
    • [28] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: an ultra-lightweight block cipher”, in Proc. of CHES'07, vol. 4727 of LNCS, pp. 450-466, 2007.
    • [29] A. Poschmann, G. Leander, K. Schramm, and C. Paar, “New light-weight crypto algorithms for RFID”, in Proc. of IEEE International Symposium on Circuits and Systems, ISCAS'07, pp. 1843-1846, 2007.
    • [30] D. Hong, et al., “HIGHT: a new block cipher suitable for low-resource device, in Proc. of CHES'06, LNCS vol. 4249, pp. 46-59, 2006.
    • [31] M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, “AES implementation on a grain of sand”, in IEEE Proc. of Information Security, vol. 152(1), pp. 13-20, 2005.
    • [32] T. Good, and M. Benaissa, “Hardware results for selected stream cipher candidates”, in http://www.ecrypt.eu.org/ stream/, 2007.
    • [33] M. Feldhofer and C. Rechberger, “A case against currently used hash functions in RFID protocols”, in Hand. of RFIDSec'06, 2006.
    • [34] A. Bogdanov, G. Leander, C. Paar, A. Poschmann, Matt J.B. Robshaw, and Y. Seurin. “Hash functions and RFID tags: mind the gap”, in Proc. of CHES'08, vol. 5154 of LNCS, pp. 283-299, 2008.
    • [35] A. Juels, “Minimalist cryptography for low-cost RFID tags”, in Proc. of SCN'04, vol. 3352 of LNCS, pp. 149-164, 2004.
    • [36] S. Inoue, and H. Yasuura, “RFID privacy using usercontrollable uniqueness”, in RFID Privacy Workshop, 2003.
    • [37] M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “Keep on Blockin' in the free world: personal access control for low-cost RFID tags”, in Proc. of the 13th Int'l Workshop on Security Protocols, Apr 2005.
    • [38] A. Juels, P. Syverson, and D. Bailey, “High-power proxies for enhancing RFID privacy and utility”, in Proc. of PET '05, 2005.
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

Share - Bookmark

Download from

Cite this article