Proceeding of the Electrical Engineering Computer Science and Informatics
Vol 1: EECSI 2014

Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard

Mu’awya Naser (Khalifa City Women College, Higher College of Technology HCT, Abu Dhabi)
Rahmat Budiarto (College of Comp. Science and Information Technology, Albaha University, Albaha)
Ismat Aldmour (College of Comp. Science and Information Technology, Albaha University, Albaha)
Pedro Peris Lopez (Computer Security Lab (COSEC), Computer Science Department, Carlos III University of Madrid, Madrid)



Article Info

Publish Date
20 Aug 2014

Abstract

In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks.

Copyrights © 2014






Journal Info

Abbrev

EECSI

Publisher

Subject

Computer Science & IT Electrical & Electronics Engineering

Description

Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, ...