Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard (original) (raw)

An Efficient Design and Implementation of Securable RFID Tag-Reader Mutual Authentication Protocol

2015

Radio frequency identification( RFID) is unwired processing task uses the radio signals for communication purpose. By using radio signals RFID pointing out the objects with unique electronic product code. This electronic product code hiving unique identification for single-single objects. The main disadvantages of RFID is, leaking the information as distance increases. As distances increases unsecured authentication start between the tag and reader. At this time unauthorized user may get all the information of the object and as well as unauthorized user may guess the password also. Hence unsecured authentication may generate some security problems and secret-privacy protection problems to the authorized user. EPC Class-1 generation-2 technique generates to many security issues hence to overcome these problems we proposing new pad generation technique instead of EPC Class-1 generation-2 technique. By doing this we producing strong authentication between tag and reader. In this paper ...

Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

2018

Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, Wei and Zhang proposed a new lightweight RFID authentication protocol that conforms to the EPC-C1G2 standard and claimed that the protocol would be immune against all known attacks on RFID systems. In this paper, we consider the security of this protocol and show that it cannot provide secure authentication for RFID users. An attacker, by following our suggested approach, will be able to impersonate server/reader, and destroy synchronization between the back-end server and the tag. Finally, we enhance this protocol, and by using formal and informal security analysis we show that the enhanced protocol strongly inhibits the security flaws of its predecessor.

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Recently, due to widespread use of Radio Frequency IDentification (RFID) systems in personal applications, security and privacy of these systems have got more attention. In order to provide security and privacy of RFID users, different authentication protocols have been proposed. In 2014, Mohammadi et al. proposed an improved authentication protocol for RFID systems. They claimed that their protocol is secure against various attacks. In this study, we investigate security and privacy of their protocol. It is shown that their protocol is not safe against several attacks including secret parameters reveal, tag impersonation, data integrity, desynchronization and also it cannot provide user privacy. Then, in order to omit aforementioned weaknesses, we apply some changes on Mohammadi et al.’s protocol and we propose an improved protocol. In addition, the security and privacy of the proposed protocol are analyzed against various attacks.

On the security of mutual authentication protocols for rfid systems: the case of wei et al.’s protocol

2012

Authentication is one of the most basic and important cryptographic tasks. Mutual authentication protocols play a crucial role on the security of RFID systems. In this paper, we consider the security of a recently proposed mutual authentication protocol by Wei et al. which is a hash based protocol. We present efficient tag impersonation attack, two desynchronization attacks, reader impersonation attack and traceability attack against this protocol.