A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Security of EPC Gen2 Compliant RFID Protocols
[chapter]
2008
Lecture Notes in Computer Science
RFID mutual authentication protocol with forward secrecy that is compliant with the EPC Class2 Gen2 standard. ...
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. ...
Acknowledgement The authors thank the anonymous reviewers for helpful comments and suggestions. ...
doi:10.1007/978-3-540-68914-0_30
fatcat:pynnamcenfecnklye2vcwpbmyy
The design and assessment of a secure passive RFID sensor system
2011
2011 IEEE 9th International New Circuits and systems conference
This paper presents a low-overhead security enhancement for EPC Class-1 Generation-2 (Gen2) compatible RFID tags that provides data confidentiality for a series of common threats. ...
The circuit is evaluated in an FPGA-based emulation platform which allows for the validation of the circuit and the use of a protocol which seamlessly interacts with a standard off-the-shelf RFID reader ...
This work explores the design, validation, and emulation of a Gen2 compliant secure environmental sensing RFID platform. ...
doi:10.1109/newcas.2011.5981327
fatcat:ffkaxrvo4fetvlxuz5qujzxr6y
J3Gen: A PRNG for Low-Cost Passive RFID
2013
Sensors
Pseudorandom number generation (PRNG) is the main security tool in low-cost passive radio-frequency identification (RFID) technologies, such as EPC Gen2. ...
J3Gen successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard. ...
The authors thank as well the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper. ...
doi:10.3390/s130303816
pmid:23519344
pmcid:PMC3658777
fatcat:2mn3fethxbcrfb6qx7dlzxddl4
Secure EPC Gen2 Compliant Radio Frequency Identification
[chapter]
2009
Lecture Notes in Computer Science
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. ...
Recently three EPCGen2 compliant protocols that address security issues were proposed in the literature. ...
The rest of this paper is organized as follows. Section 2 introduces the EPC-Gen2 standard focusing on security issues. Section 3 analyzes three recently proposed EPCGen2 protocols. ...
doi:10.1007/978-3-642-04383-3_17
fatcat:b5ngvp4ygnf5xpuorw5yw3ihqq
Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags
2011
IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society
We present a lightweight pseudorandom number generator (PRNG) design for EPC Gen2 RFID tags. ...
The proposal successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard. ...
EPC Gen2 compliant RFID tags are passive electronic labels without self-power supply. They are energized by the electromagnetic field of RFID readers. ...
doi:10.1109/iecon.2011.6119932
fatcat:ypgofkz6kfdgpnfrp7zgbcdygy
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags
2010
Wireless personal communications
As a consequence, security on board of EPC Gen2 tags is often minimal. ...
The Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain. ...
Acknowledgements This work has been supported by the Spanish Ministry of Science and Innovation, the FEDER funds under the grants TSI2007-65406-C03-03 E-AEGIS, CONSOLIDER CSD2007-00004 ARES, an IN3-UOC ...
doi:10.1007/s11277-010-0187-1
fatcat:zwemxpphvjeydcg35oyk5t35hq
Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices
[article]
2022
arXiv
pre-print
We comprehensively evaluate Wisecr's overhead, demonstrate its implementation over standards-compliant protocols, analyze its security and implement an end-to-end realization with popular CRFID devices ...
We consider the challenging problem of simultaneous and secure firmware updates or patching for a typical class of such devices -- Computational Radio Frequency Identification (CRFID) devices. ...
protocol or simply the EPC Gen2. ...
arXiv:2103.10671v3
fatcat:zethada2z5g2vbh36mcsolbtxu
Technology, Standards, and Real-World Deployments of the EPC Network
2009
IEEE Internet Computing
In the EPC Network Architecture, the reader protocol (RP), a reader API that abstracts entirely from the underlying hardware, determines access to RFID reader devices. ...
EPC Network users might sooner or later be facing a variety of security issues. 14 Owing to its heritage, the ONS shares the benefits of the DNS, but is also prone to denial-of-service attacks and cache ...
doi:10.1109/mic.2009.46
fatcat:i4pagatwlnfujbyeneef5kq2qi
Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags
2012
International Journal of RFID Security and Cryptography
Many of these applications base on the successful implementation of security services on the RFID tag side but also on the reader side. ...
They are very flexible in terms of functionality and support different communication standards like ISO 15693, ISO 14443, and ISO 18000-6C (EPC Gen2). ...
The UHF DemoTag supports the ISO18000-6C standard (EPC Gen2 [7] ) which is the most widespread protocol in the UHF range. The protocol execution is programmed in software on the microcontroller. ...
doi:10.20533/ijrfidsc.2046.3715.2012.0003
fatcat:gfxogv5urnbgdhgqksrqkxifpi
An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting
2017
IEEE Access
The ECC-DH authentication protocol is compatible with the ISO/IEC 18000-63 ("Gen2") passive UHF RFID protocol. The ECC processor requires 12 145 gate equivalents. ...
This size, speed, and power of the ECC processor makes it practical to use within a passive UHF RFID tag and achieve up to 1500 banknote authentications per minute, which is sufficient for use in the fastest ...
THE EPC GEN2 PROTOCOL The EPC Gen2 air interface protocol standard was first published in 2004 [24] . ...
doi:10.1109/access.2016.2615003
fatcat:ouei4q3i4vbxvhszgktdhrtice
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
2014
Proceeding of the Electrical Engineering Computer Science and Informatics
In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. ...
The protocol is suitable for Gen-2 passive tags and requires simple computations. ...
The design of secure RFID authentication protocols compliant with Gen2 standard is still an open-challenge. ...
doi:10.11591/eecsi.v1.369
fatcat:dwxepaetvnb6hhrpfljap7kv4e
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
[article]
2019
arXiv
pre-print
The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices ...
The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. ...
Our approach is to realize a standard compliant secure firmware update protocol and therefore we design our secure firmware update protocol over the EPC Gen2 protocol. ...
arXiv:1807.10463v3
fatcat:moig5tynmbecvo63ihhpkedjca
A Systematic TRMA Protocol for Yielding Secure Environment for Authentication and Privacy Aspects
2019
International Journal of Advanced Computer Science and Applications
In spite of RFID's wide application in industries, it poses a severe security issue. ...
To protect the RFID system against such attacks, the Pad-generation (Pad-Gen) function is used. ...
A security protocol is considered as EPC compliant only if it solely makes use of one or more functions [9] . Moreover, the functions mentioned are not cryptographic functions themselves. ...
doi:10.14569/ijacsa.2019.0101256
fatcat:d5gf3ke3jjh6ndt2ouou3woava
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
[chapter]
2010
Lecture Notes in Computer Science
The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately. ...
This proposal attempts to correct many of the well known security shortcomings of the standard, and even includes a BAN logic based formal security proof. ...
Vulnerabilities of Qingling's Protocol In this section we analyze the most relevant weaknesses of the QYY-Gen2 protocol. ...
doi:10.1007/978-3-642-16342-5_28
fatcat:xyahtzizxne2dalxrrdgvcj4zi
PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 Standards
2008
2008 IEEE International Conference on e-Business Engineering
To resolve the security vulnerabilities and comply with EPC Class 1 Gen 2 UHF RFID (EPC C1G2) Standard at the same time, we present a Privacy Guaranteed Mutual Authentication Protocol (PGMAP). ...
By utilizing the existing functions and memory bank of tag, we amend the processing sequence based on current EPC architecture. ...
Security of EPC Class 1 Gen 2 UHF RFID Protocol Step 10: Tag
Security Assessment of EPC Class1 Gen2 UHF RFID Protocol From the view of security, the processing sequence of EPC C1G2 protocol mainly ...
doi:10.1109/icebe.2008.16
dblp:conf/icebe/WangWY08
fatcat:vniowm7jrrhe5p43j3axy35b7q
« Previous
Showing results 1 — 15 out of 67 results