Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards

Various radio-frequency identification standards and products have been designed to meet various market needs. To satisfy various requirements and integrate important features of existent standards, EPCglobal (2013/11) announced the new Gen2 standard called EPC Class 2 Generation 2 version 2. Even though inheriting the name Gen2, Generation 2 version 2 goes far beyond the features and functions of Generation 2 version 1. Generation 2 version 2 is a super set of several existent radio-frequency identification standards. It opens up great opportunities of novel radio-frequency identification applications that could not be implemented using conventional radio-frequency identification standards and products. In this article, we introduce the new standards and propose one new mutual authentication scheme which protects tags’ identifications. This scheme is the first radio-frequency identification authentication that could protect tags from unauthorized tracing and unauthorized identification using coming standard-based products. The analysis shows that the proposed scheme owns better performance than their counterparts in the multi-tag setting.

[1]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[2]  Joaquín García,et al.  Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags , 2010, Financial Cryptography Workshops.

[3]  Kwangjo Kim,et al.  Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.

[4]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[5]  Jaemin Park,et al.  A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag , 2007, Future Generation Communication and Networking (FGCN 2007).

[6]  J. Mitsugi,et al.  A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.

[7]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[8]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[9]  Ming-Hour Yang,et al.  Secure multiple group ownership transfer protocol for mobile RFID , 2012, Electron. Commer. Res. Appl..

[10]  Dong Hoon Lee,et al.  Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.

[11]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[12]  Wei-Bin Lee,et al.  Enhancement of the RFID security method with ownership transfer , 2009, ICUIMC '09.

[13]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[14]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[15]  Hung-Yu Chien,et al.  Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs , 2014, 2014 Ninth Asia Joint Conference on Information Security.

[16]  Dong Hoon Lee,et al.  Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems , 2006, OTM Workshops.

[17]  Zhong Chen,et al.  Lightweight RFID Mutual Authentication Protocol against Feasible Problems , 2011, ICICS.

[18]  Panu Hämäläinen,et al.  Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).

[19]  Hung Yu Chien New Gen2v2-Based Mutual Authentication Schemes , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.

[20]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[21]  Junyu Wang,et al.  On security with the new Gen2 RFID security framework , 2013, 2013 IEEE International Conference on RFID (RFID).

[22]  Basel Alomair,et al.  Securing low-cost RFID systems: An unconditionally secure approach , 2011, J. Comput. Secur..

[23]  Manfred Josef Aigner,et al.  Report on first part of the security WP: Anti-Cloning Tag (D4.3.1) , 2008 .

[24]  Hung-Yu Chien,et al.  On the security of several Gen2-based protocols without modifying the standards , 2012 .

[25]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[26]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[27]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.

[28]  Kwangjo Kim,et al.  RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .