By Topic

Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Habibi, M.H. ; Fac. of Electr. Eng., I.H Univ., Tehran, Iran ; Gardeshi, M.

The developing of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy issues in precise. Among other security characteristic of an RFID authentication protocol, the untraceability and synchronization are the most important attributes. The former is strongly related to the privacy of tags and their holders, while the later has a significant role in the security and availability parameters. In this paper we investigate the recent proposed RFID authentication protocol by Yeh, Wang, Kuo, and Wang in terms of privacy and security. At first, a powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al.'s protocol does not assure the untraceabilitiy and backward untraceabilitiy attributes. We also will propose our revision to safeguard the Yeh et al.'s protocol against the cited attacks.

Published in:

Information Security and Cryptology (ISCISC), 2011 8th International ISC Conference on

Date of Conference:

14-15 Sept. 2011