File(s) under permanent embargo
RFID tags : grouping proof with forward security
conference contribution
posted on 2013-01-01, 00:00 authored by Saravanan Sundaresan, Robin Ram Mohan DossRobin Ram Mohan Doss, Wanlei ZhouSeveral grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.
History
Event
IEEE RFID-Technologies and Applications. International Conference (2013 : Johor Bahru, Malaysia)Pagination
1 - 6Publisher
IEEELocation
Johor Bahru, MalaysiaPlace of publication
Piscataway, N. J.Publisher DOI
Start date
2013-09-04End date
2013-09-05ISBN-13
9781479921140Language
engNotes
Article numberĀ 6694545Publication classification
E1 Full written paper - refereedCopyright notice
2013, IEEETitle of proceedings
RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conferenceUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC