Improvement of an EPC Gen2 compliant RFID authentication protocol

Kuo Hui Yeh*, N. W. Lo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Recently, lightweight RFID authentication protocol has been investigated extensively due to the awareness of practical requirements on individual privacy, robust system security and resource limitation of low-cost tags. Research studies have demonstrated major advancements in the direction of designing a secure access control mechanism for RFID system with resource-constrained tags. In 2008, Burmester and Medeiros developed an EPC Class 1 Generation 2 (EPC Gen2) compliant authentication protocol, called TRAP-3, to support tag anonymity, data confidentiality and forward security in which only primitive computation functions such as 32-bit pseudo random generator and simple exclusive-or operation are required. Nevertheless, TRAP-3 is vulnerable to desynchronization attack. The secret key value, which is shared between the tag and the backend database, can be out of synchronization by just performing a series of challenge-response operations. To remedy this authentication flaw, in this study we develop a countermeasure mechanism and accordingly gain security enhancement for TRAP-3.

Original languageEnglish
Title of host publication5th International Conference on Information Assurance and Security, IAS 2009
Pages532-535
Number of pages4
DOIs
StatePublished - 2009
Event5th International Conference on Information Assurance and Security, IAS 2009 - Xian, China
Duration: 18 Aug 200920 Sep 2009

Publication series

Name5th International Conference on Information Assurance and Security, IAS 2009
Volume1

Conference

Conference5th International Conference on Information Assurance and Security, IAS 2009
Country/TerritoryChina
CityXian
Period18/08/0920/09/09

Keywords

  • Authentication
  • EPC Gen2 standard
  • Privacy
  • RFID
  • Security
  • TRAP-3

Fingerprint

Dive into the research topics of 'Improvement of an EPC Gen2 compliant RFID authentication protocol'. Together they form a unique fingerprint.

Cite this