Security analysis on RFID mutual authentication protocol

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification (RFID) has received much attention both in industry and academia in recent years. To this extent, the international standards group, ISO/IEC JTC 1/SC 31, is in the midst of standardization activity to define the security extension to the EPCglobal Generation 2 (Gen2) ultra high frequency (UHF) air interface protocols for secure RFID communications. In this paper, we investigate a vulnerability of an RFID mutual authentication protocol that was highlighted in a recent letter [5]. Our analysis presents that the attack on the mutual authentication protocol is just a relay operation between a legitimate reader and a legitimate tag. We also propose the threshold values of data rate between a reader and a tag based on link timing parameters of passive UHF RFID systems.

Cite

CITATION STYLE

APA

Kang, Y. S., O’Sullivan, E., Choi, D., & O’Neill, M. (2016). Security analysis on RFID mutual authentication protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9503, pp. 65–74). Springer Verlag. https://doi.org/10.1007/978-3-319-31875-2_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free