67 Hits in 2.6 sec

The Security of EPC Gen2 Compliant RFID Protocols [chapter]

Mike Burmester, Breno de Medeiros
2008 Lecture Notes in Computer Science  
RFID mutual authentication protocol with forward secrecy that is compliant with the EPC Class2 Gen2 standard.  ...  The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry.  ...  Acknowledgement The authors thank the anonymous reviewers for helpful comments and suggestions.  ... 
doi:10.1007/978-3-540-68914-0_30 fatcat:pynnamcenfecnklye2vcwpbmyy

The design and assessment of a secure passive RFID sensor system

Michael Todd, Wayne Burleson, Russell Tessier
2011 2011 IEEE 9th International New Circuits and systems conference  
This paper presents a low-overhead security enhancement for EPC Class-1 Generation-2 (Gen2) compatible RFID tags that provides data confidentiality for a series of common threats.  ...  The circuit is evaluated in an FPGA-based emulation platform which allows for the validation of the circuit and the use of a protocol which seamlessly interacts with a standard off-the-shelf RFID reader  ...  This work explores the design, validation, and emulation of a Gen2 compliant secure environmental sensing RFID platform.  ... 
doi:10.1109/newcas.2011.5981327 fatcat:ffkaxrvo4fetvlxuz5qujzxr6y

J3Gen: A PRNG for Low-Cost Passive RFID

Joan Melià-Seguí, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí
2013 Sensors  
Pseudorandom number generation (PRNG) is the main security tool in low-cost passive radio-frequency identification (RFID) technologies, such as EPC Gen2.  ...  J3Gen successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard.  ...  The authors thank as well the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper.  ... 
doi:10.3390/s130303816 pmid:23519344 pmcid:PMC3658777 fatcat:2mn3fethxbcrfb6qx7dlzxddl4

Secure EPC Gen2 Compliant Radio Frequency Identification [chapter]

Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
2009 Lecture Notes in Computer Science  
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry.  ...  Recently three EPCGen2 compliant protocols that address security issues were proposed in the literature.  ...  The rest of this paper is organized as follows. Section 2 introduces the EPC-Gen2 standard focusing on security issues. Section 3 analyzes three recently proposed EPCGen2 protocols.  ... 
doi:10.1007/978-3-642-04383-3_17 fatcat:b5ngvp4ygnf5xpuorw5yw3ihqq

Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags

Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti
2011 IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society  
We present a lightweight pseudorandom number generator (PRNG) design for EPC Gen2 RFID tags.  ...  The proposal successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard.  ...  EPC Gen2 compliant RFID tags are passive electronic labels without self-power supply. They are energized by the electromagnetic field of RFID readers.  ... 
doi:10.1109/iecon.2011.6119932 fatcat:ypgofkz6kfdgpnfrp7zgbcdygy

A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags

Joan Melià-Seguí, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí
2010 Wireless personal communications  
As a consequence, security on board of EPC Gen2 tags is often minimal.  ...  The Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain.  ...  Acknowledgements This work has been supported by the Spanish Ministry of Science and Innovation, the FEDER funds under the grants TSI2007-65406-C03-03 E-AEGIS, CONSOLIDER CSD2007-00004 ARES, an IN3-UOC  ... 
doi:10.1007/s11277-010-0187-1 fatcat:zwemxpphvjeydcg35oyk5t35hq

Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices [article]

Yang Su, Michael Chesser, Yansong Gao, Alanson P. Sample, Damith C. Ranasinghe
2022 arXiv   pre-print
We comprehensively evaluate Wisecr's overhead, demonstrate its implementation over standards-compliant protocols, analyze its security and implement an end-to-end realization with popular CRFID devices  ...  We consider the challenging problem of simultaneous and secure firmware updates or patching for a typical class of such devices -- Computational Radio Frequency Identification (CRFID) devices.  ...  protocol or simply the EPC Gen2.  ... 
arXiv:2103.10671v3 fatcat:zethada2z5g2vbh36mcsolbtxu

Technology, Standards, and Real-World Deployments of the EPC Network

Frédéric Thiesse, Christian Floerkemeier, Mark Harrison, Florian Michahelles, Christof Roduner
2009 IEEE Internet Computing  
In the EPC Network Architecture, the reader protocol (RP), a reader API that abstracts entirely from the underlying hardware, determines access to RFID reader devices.  ...  EPC Network users might sooner or later be facing a variety of security issues. 14 Owing to its heritage, the ONS shares the benefits of the DNS, but is also prone to denial-of-service attacks and cache  ... 
doi:10.1109/mic.2009.46 fatcat:i4pagatwlnfujbyeneef5kq2qi

Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags

Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger
2012 International Journal of RFID Security and Cryptography  
Many of these applications base on the successful implementation of security services on the RFID tag side but also on the reader side.  ...  They are very flexible in terms of functionality and support different communication standards like ISO 15693, ISO 14443, and ISO 18000-6C (EPC Gen2).  ...  The UHF DemoTag supports the ISO18000-6C standard (EPC Gen2 [7] ) which is the most widespread protocol in the UHF range. The protocol execution is programmed in software on the microcontroller.  ... 
doi:10.20533/ijrfidsc.2046.3715.2012.0003 fatcat:gfxogv5urnbgdhgqksrqkxifpi

An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting

Xi Tan, Mianxiong Dong, Cheng Wu, Kaoru Ota, Junyu Wang, Daniel W. Engels
2017 IEEE Access  
The ECC-DH authentication protocol is compatible with the ISO/IEC 18000-63 ("Gen2") passive UHF RFID protocol. The ECC processor requires 12 145 gate equivalents.  ...  This size, speed, and power of the ECC processor makes it practical to use within a passive UHF RFID tag and achieve up to 1500 banknote authentications per minute, which is sufficient for use in the fastest  ...  THE EPC GEN2 PROTOCOL The EPC Gen2 air interface protocol standard was first published in 2004 [24] .  ... 
doi:10.1109/access.2016.2615003 fatcat:ouei4q3i4vbxvhszgktdhrtice

Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard

Mu'awya Naser, Rahmat Budiarto, Ismat Aldmour, Pedro Peris Lopez
2014 Proceeding of the Electrical Engineering Computer Science and Informatics  
In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard.  ...  The protocol is suitable for Gen-2 passive tags and requires simple computations.  ...  The design of secure RFID authentication protocols compliant with Gen2 standard is still an open-challenge.  ... 
doi:10.11591/eecsi.v1.369 fatcat:dwxepaetvnb6hhrpfljap7kv4e

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices [article]

Yang Su, Yansong Gao, Michael Chesser, Omid Kavehei, Alanson Sample, Damith C.Ranasinghe
2019 arXiv   pre-print
The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices  ...  The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things.  ...  Our approach is to realize a standard compliant secure firmware update protocol and therefore we design our secure firmware update protocol over the EPC Gen2 protocol.  ... 
arXiv:1807.10463v3 fatcat:moig5tynmbecvo63ihhpkedjca

A Systematic TRMA Protocol for Yielding Secure Environment for Authentication and Privacy Aspects

Anusha R, Veena Devi
2019 International Journal of Advanced Computer Science and Applications  
In spite of RFID's wide application in industries, it poses a severe security issue.  ...  To protect the RFID system against such attacks, the Pad-generation (Pad-Gen) function is used.  ...  A security protocol is considered as EPC compliant only if it solely makes use of one or more functions [9] . Moreover, the functions mentioned are not cryptographic functions themselves.  ... 
doi:10.14569/ijacsa.2019.0101256 fatcat:d5gf3ke3jjh6ndt2ouou3woava

Weaknesses in Two Recent Lightweight RFID Authentication Protocols [chapter]

Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe
2010 Lecture Notes in Computer Science  
The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately.  ...  This proposal attempts to correct many of the well known security shortcomings of the standard, and even includes a BAN logic based formal security proof.  ...  Vulnerabilities of Qingling's Protocol In this section we analyze the most relevant weaknesses of the QYY-Gen2 protocol.  ... 
doi:10.1007/978-3-642-16342-5_28 fatcat:xyahtzizxne2dalxrrdgvcj4zi

PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 Standards

Jiahao Wang, Edward C. Wong, Terry Ye
2008 2008 IEEE International Conference on e-Business Engineering  
To resolve the security vulnerabilities and comply with EPC Class 1 Gen 2 UHF RFID (EPC C1G2) Standard at the same time, we present a Privacy Guaranteed Mutual Authentication Protocol (PGMAP).  ...  By utilizing the existing functions and memory bank of tag, we amend the processing sequence based on current EPC architecture.  ...  Security of EPC Class 1 Gen 2 UHF RFID Protocol Step 10: Tag Security Assessment of EPC Class1 Gen2 UHF RFID Protocol From the view of security, the processing sequence of EPC C1G2 protocol mainly  ... 
doi:10.1109/icebe.2008.16 dblp:conf/icebe/WangWY08 fatcat:vniowm7jrrhe5p43j3axy35b7q
« Previous Showing results 1 — 15 out of 67 results