A secure ownership transfer protocol using EPCglobal Gen-2 RFID

Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be addressed. Due to the wireless transmission of the RFID system, malicious people can gain the information in the RFID tags, and the user’s privacy is invaded. Although there have been many protection methods proposed for RFID security, the system has remained vulnerable to various attacks. In this paper, we propose a conforming of the EPCglobal Class 1 Generation 2 standards RFID ownership transfer protocol with provable security. The proposed scheme can resist several attacks and ensure a secure transaction.

[1]  Wei Guo,et al.  Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network , 2013, Telecommun. Syst..

[2]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[3]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[4]  Yeong-Lin Lai,et al.  A smart card-based mobile secure transaction system for medical treatment examination reports , 2011 .

[5]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[6]  Mikhail Nesterenko,et al.  RFID security without extensive cryptography , 2005, SASN '05.

[7]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[8]  Chin-Ling Chen,et al.  Group-Based Authentication to Protect Digital Content for Business Applications , 2009 .

[9]  Kwangjo Kim,et al.  A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags , 2007 .

[10]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[11]  Adrian Perrig,et al.  Proceedings of the 2nd ACM workshop on Wireless security , 2003 .

[12]  Peris-LopezPedro,et al.  Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009 .

[13]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[14]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[15]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[16]  Dong Hoon Lee,et al.  Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.

[17]  Juan E. Tapiador,et al.  Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009, Comput. Stand. Interfaces.

[18]  Xuemei Liu,et al.  Evaluating the energy consumption of the RFID tag collision resolution protocols , 2013, Telecommun. Syst..

[19]  Tsuyoshi Takagi,et al.  An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.

[20]  Chin-Ling Chen,et al.  Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..

[21]  Rolf Kraemer,et al.  A hardware accelerated implementation of the IEEE 802.15.3 MAC protocol , 2007, WSAN.

[22]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.