Deakin University
Browse

File(s) under permanent embargo

RFID tags : grouping proof with forward security

conference contribution
posted on 2013-01-01, 00:00 authored by Saravanan Sundaresan, Robin Ram Mohan DossRobin Ram Mohan Doss, Wanlei Zhou
Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

History

Event

IEEE RFID-Technologies and Applications. International Conference (2013 : Johor Bahru, Malaysia)

Pagination

1 - 6

Publisher

IEEE

Location

Johor Bahru, Malaysia

Place of publication

Piscataway, N. J.

Start date

2013-09-04

End date

2013-09-05

ISBN-13

9781479921140

Language

eng

Notes

Article numberĀ 6694545

Publication classification

E1 Full written paper - refereed

Copyright notice

2013, IEEE

Title of proceedings

RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference