Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/2979
Title: RFID Authentication Protocol for mobile readers satisfying EPC-C1-GEN2 standard of Passive Tags
Authors: Priyanka, Y. J
Turuk, Ashok Kumar
Keywords: Security
Authentication
Cryptography
Attacks
Issue Date: Mar-2018
Citation: IEEE International Conference on Technologies for Smart-City Energy Security and Power (ICSESP-2018), Bhubaneswar, Odisha, India, 28 - 30 March, 2018
Abstract: Radio Frequency Identification (RFID) applications have gained a lot of popularity using which the products can be uniquely identified using the radio signals. With the advancement of technology, the need for mobile RFID readers have been increased rapidly. A lot of RFID authentication protocols have been proposed and most of them have considered the channel between reader and server as secure and also most protocols requires high computational power for RFID tags and according to EPC Class-1 Generation-2 standards of passive tags the one-way hash functions are difficult to compute for passive tags. This paper presents an efficient authentication protocol for mobile RFID readers where an insecure channel is considered between server and reader and also at the same time it can be used for low cost RFID tags. In the proposed protocol authentication is achieved by using low cost cryptographic functions such as a combination of XOR and Pseudo Random Number Generator. The simulation of this protocol is done using AVISPA tool and the security analysis of this proposed protocol is analyzed and hence is proved to be resistant to eavesdropping, replay attack, desynchronization attack, reader impersonation, tag impersonation, traceability and also man-in-the-middle attacks.
Description: Copyright of this document belongs to proceedings publisher.
URI: http://hdl.handle.net/2080/2979
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2018_ICSESP_YJPriyanka_RFID.pdfConference Paper311.89 kBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.