Path: Top -> Journal -> Telkomnika -> 2015 -> Vol 13, No 3: September

SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard

SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard

Journal from gdlhub / 2016-11-17 04:28:44
By : Mu’awya Naser, Ismat Aldmour, Rahmat Budiarto, Pedro Peris-Lopez, Telkomnika
Created : 2015-09-01, with 1 files

Keyword : : lightweight RFID, EPC Class-1 Gen-2, mutual authentication protocol, security analysis
Url : http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/1440

Having done an analysis on the security vulnerabilities of Radio Frequency Identification (RFID) through a desynchronization and an impersonation attacks, it is revealed that the secret information (i.e.: secret key and static identifier) shared between the tag and the reader is unnecessary. To overcome the vulnerability, this paper introduces Shelled Lightweight Random Value (SLRV) protocol; a mutual authentication protocol with high-security potentials conforming to electronic product code (EPC) Class-1 Generation-2 Tags, based on lightweight and standard cryptography on the tag’s and reader’s side, respectively. SLRV prunes de-synchronization attacks where the updating of internal values is only executed on the tag’s side and is a condition to a successful mutual authentication. Results of security analysis of SLRV, and comparison with existing protocols, are presented.

Description Alternative :

Having done an analysis on the security vulnerabilities of Radio Frequency Identification (RFID) through a desynchronization and an impersonation attacks, it is revealed that the secret information (i.e.: secret key and static identifier) shared between the tag and the reader is unnecessary. To overcome the vulnerability, this paper introduces Shelled Lightweight Random Value (SLRV) protocol; a mutual authentication protocol with high-security potentials conforming to electronic product code (EPC) Class-1 Generation-2 Tags, based on lightweight and standard cryptography on the tag’s and reader’s side, respectively. SLRV prunes de-synchronization attacks where the updating of internal values is only executed on the tag’s side and is a condition to a successful mutual authentication. Results of security analysis of SLRV, and comparison with existing protocols, are presented.

Give Comment ?#(0) | Bookmark

PropertyValue
Publisher IDgdlhub
OrganizationTelkomnika
Contact NameHerti Yani, S.Kom
AddressJln. Jenderal Sudirman
CityJambi
RegionJambi
CountryIndonesia
Phone0741-35095
Fax0741-35093
Administrator E-mailelibrarystikom@gmail.com
CKO E-mailelibrarystikom@gmail.com

Print ...

Contributor...

  • , Editor: sukadi

Downnload...