Abstract
In this whitepaper, we present a synchronization-based communication protocol for EPCglobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitimate tags, respectively. In addition, our protocol provides that each RFID tag emits a different bit string (pseudonym) or meta-ID when receiving each and every reader’s query. Therefore, it makes tracking activities and personal preferences of tag’s owner impractical to provide the user’s privacy.
Keywords
- Authentication Protocol
- Electronic Product Code
- Radio Frequency Identification Device
- Cyclic Redundancy Code
- Privacy Protection Mechanism
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
EPCglobal Inc. Available from: http://www.epcglobalinc.org/
EPCglobal Inc.: Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.09. Available from: http://www.epcglobalinc.org/standards_technology/ specifications.html
Juels, A.: Strenthening EPC tag against cloning. In: Jakobsson, M., Poovendran, R. (eds.): ACM Workshop on Wireless Security (WiSe) (2005) 67–76
Juels, A.: RFID security and privacy: A research survey. In: IEEE Journal on Selected Areas in Communication (2006)
Weis, S.: Security and privacy in radio frequency identification devices. In: Master Thesis (2003) Available from: http://theory.lcs.mit.edu/~sweis/masters.pdf
Molnar, D., Soppera, A., Wagner, D.: A Scalable, delegatable pseudonym protocol enabling ownership transfer of a RFID tag. In: Preneel, R., Tavares, S. (eds.): Selected Areas in Cryptography (SAC), LNCS, Vol. 3897. Springer-Verlag, Berlin Heidelberg New York (2005) 276–290
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: the Proceedings of International Conference on Ubiquitous Computing, Workshop Privacy (2004)
Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID system. In: Preneel, R., Tavares, S. (eds.): Selected Areas in Cryptography (SAC), LNCS, Vol. 3897. Springer-Verlag, Berlin Heidelberg New York (2005) 291–306
Yang, J.: Security and privacy on authentication protocol for low-cost radio frequency identification. In: Master Thesis (2005). Available from: http://caislab.icu.ac.kr/Paper/thesis_files/2005/thesis_jkyang.pdf
Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: Proceedings of Workshop on Pervasive Computing and Communications Security (2005)
NIST: Random number generation and testing. Available from: http://csrc.nist.gov/ rng/
RFID Journal: Available from: http://www.rfidjournal.com/
Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of SecureComm”05 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Duc, D., Lee, H., Kim, K. (2008). Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-71641-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71640-2
Online ISBN: 978-3-540-71641-9
eBook Packages: Computer ScienceComputer Science (R0)