Skip to main content

Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning

  • Chapter
Networked RFID Systems and Lightweight Cryptography

Abstract

In this whitepaper, we present a synchronization-based communication protocol for EPCglobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitimate tags, respectively. In addition, our protocol provides that each RFID tag emits a different bit string (pseudonym) or meta-ID when receiving each and every reader’s query. Therefore, it makes tracking activities and personal preferences of tag’s owner impractical to provide the user’s privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. EPCglobal Inc. Available from: http://www.epcglobalinc.org/

    Google Scholar 

  2. EPCglobal Inc.: Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.09. Available from: http://www.epcglobalinc.org/standards_technology/ specifications.html

    Google Scholar 

  3. Juels, A.: Strenthening EPC tag against cloning. In: Jakobsson, M., Poovendran, R. (eds.): ACM Workshop on Wireless Security (WiSe) (2005) 67–76

    Google Scholar 

  4. Juels, A.: RFID security and privacy: A research survey. In: IEEE Journal on Selected Areas in Communication (2006)

    Google Scholar 

  5. Weis, S.: Security and privacy in radio frequency identification devices. In: Master Thesis (2003) Available from: http://theory.lcs.mit.edu/~sweis/masters.pdf

    Google Scholar 

  6. Molnar, D., Soppera, A., Wagner, D.: A Scalable, delegatable pseudonym protocol enabling ownership transfer of a RFID tag. In: Preneel, R., Tavares, S. (eds.): Selected Areas in Cryptography (SAC), LNCS, Vol. 3897. Springer-Verlag, Berlin Heidelberg New York (2005) 276–290

    Google Scholar 

  7. Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: the Proceedings of International Conference on Ubiquitous Computing, Workshop Privacy (2004)

    Google Scholar 

  8. Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID system. In: Preneel, R., Tavares, S. (eds.): Selected Areas in Cryptography (SAC), LNCS, Vol. 3897. Springer-Verlag, Berlin Heidelberg New York (2005) 291–306

    Google Scholar 

  9. Yang, J.: Security and privacy on authentication protocol for low-cost radio frequency identification. In: Master Thesis (2005). Available from: http://caislab.icu.ac.kr/Paper/thesis_files/2005/thesis_jkyang.pdf

    Google Scholar 

  10. Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: Proceedings of Workshop on Pervasive Computing and Communications Security (2005)

    Google Scholar 

  11. NIST: Random number generation and testing. Available from: http://csrc.nist.gov/ rng/

    Google Scholar 

  12. RFID Journal: Available from: http://www.rfidjournal.com/

    Google Scholar 

  13. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of SecureComm”05 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Duc, D., Lee, H., Kim, K. (2008). Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71641-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71640-2

  • Online ISBN: 978-3-540-71641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics