Skip to main content

An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6935))

Included in the following conference series:

Abstract

Radio Frequency Identification (RFID) is taking place of barcodes in our lives, thanks to its remote identification capability. However, being transmitted via radio waves, the information is exposed to many possible attacks, which may endanger the security and privacy of relevant individuals and organizations. Fortunately, there have been efforts to construct an efficient and secure protocol in conformance with EPC Class 1 Generation 2 Standard (Gen 2), the most popular standard for RFID passive tags. Yeh et al. proposed a mutual authentication protocol conforming Gen 2. However, the proposed protocol is found to be vulnerable to an attack. Thus, in this paper, we show the vulnerability of Yeh et al.’s protocol and propose countermeasures to secure the protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications 37, 7678–7683 (2010)

    Article  Google Scholar 

  2. Chien, H.Y., Chen, C.H.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces 29, 254–259 (2007)

    Article  Google Scholar 

  3. Lyu, J., Chang, S.Y., Chen, T.L.: Integrating RFID with quality assurance system – Framework and applications. Expert Systems with Applications 36, 10877–10882 (2009)

    Article  Google Scholar 

  4. ABI Research, http://www.abiresearch.com

  5. EPCglobal, http://www.EPCglobalinc.org

  6. Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: Proc. of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67 (2005)

    Google Scholar 

  7. Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning. In: Proc. of the 2006 Symposium on Cryptography and Information Security, pp. 17–20 (2006)

    Google Scholar 

  8. Choo, K.K.R.: Key Establishment: Proofs and Refutations. Ph.D. Thesis, Queensland University of Technology (2006)

    Google Scholar 

  9. van Deursen, T., Radomirović, S.: Algebraic attacks on RFID protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. LNCS, vol. 5746, pp. 38–51. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Nam, J., Paik, J., Kang, H., Kim, U., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communication Letters 13(3), 205–207 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, C., Park, S., Lee, K., Won, D. (2011). An Attack on an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Lecture Notes in Computer Science, vol 6935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24082-9_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24082-9_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24081-2

  • Online ISBN: 978-3-642-24082-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics