Sundaresan, Saravanan, Doss, Robin and Zhou, Wanlei 2013, RFID tags : grouping proof with forward security, in RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference, IEEE, Piscataway, N. J., pp. 1-6.
Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.
Article number 6694545
Field of Research
080502 Mobile Technologies 080503 Networking and Communications 080504 Ubiquitous Computing
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.