Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.
History
Pagination
1 - 6
Location
Johor Bahru, Malaysia
Start date
2013-09-04
End date
2013-09-05
ISBN-13
9781479921140
Language
eng
Notes
Article numberĀ 6694545
Publication classification
E1 Full written paper - refereed
Copyright notice
2013, IEEE
Title of proceedings
RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference