Gen2-Based RFID Authentication Protocol for Security and Privacy
#1

Gen2-Based RFID Authentication Protocol for Security and Privacy
Abstract

EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags. Recently, some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags. In this paper, we propose a novel authentication protocol based on Gen2, called Gen2^ {+}, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2^ {+} is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader-to-tag authentication. Conversely, Gen2^ {+} uses the memory read command defined in Gen2 to achieve tag-to-reader authentication. We show that Gen2^ {+} is more secure under tracing and cloning attacks.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: m privacy for collobaritve datapublishing, ppt on rfid based security system, security protocol and version, rfid hid, full project rfid authentication free download, rfid authentication protocol verilog source code, rfid mutual authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Gen2-Based RFID Authentication Protocol for Security and Privacy - by computer science crazy - 17-09-2009, 02:48 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  RFID Based Attendance System seminar surveyer 6 9,263 13-10-2013, 09:49 PM
Last Post: Guest
  EMBEDDED SECURITY SYSTEM IN AUTOMATED TELLER MACHINE seminar class 2 2,789 30-09-2013, 10:56 AM
Last Post: computer topic
  GSM Security And Encryption computer science crazy 2 2,886 22-03-2013, 11:06 AM
Last Post: computer topic
  Wireless Application Protocol computer science crazy 4 5,761 29-11-2012, 02:28 PM
Last Post: seminar details
  Image Authentication Techniques computer science crazy 2 4,263 15-11-2012, 12:24 PM
Last Post: seminar details
  A microprocessor-based generator of synchronizing signal and test signal for colour T Electrical Fan 1 5,045 07-11-2012, 11:38 PM
Last Post: Guest
  DTMF Based Interfacing and Control of Induction Motor using TRIAC computer girl 0 1,867 07-06-2012, 11:02 AM
Last Post: computer girl
  Internet Protocol Television (IPTV) computer science crazy 13 8,844 14-07-2011, 10:40 AM
Last Post: smart paper boy
Rainbow RFID SYSTEMS seminar projects crazy 4 3,680 01-05-2011, 12:01 PM
Last Post: YashaswiniV
  Security and Privacy Support for Data-Centric Sensor Networks computer science crazy 1 2,674 19-03-2011, 09:47 AM
Last Post: seminar class

Forum Jump: