An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio Frequency Identification (RFID) is taking place of barcodes in our lives, thanks to its remote identification capability. However, being transmitted via radio waves, the information is exposed to many possible attacks, which may endanger the security and privacy of relevant individuals and organizations. Fortunately, there have been efforts to construct an efficient and secure protocol in conformance with EPC Class 1 Generation 2 Standard (Gen 2), the most popular standard for RFID passive tags. Yeh et al. proposed a mutual authentication protocol conforming Gen 2. However, the proposed protocol is found to be vulnerable to an attack. Thus, in this paper, we show the vulnerability of Yeh et al.'s protocol and propose countermeasures to secure the protocol. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Lee, C., Park, S., Lee, K., & Won, D. (2011). An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6935 LNCS, pp. 488–495). https://doi.org/10.1007/978-3-642-24082-9_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free