Skip to main content

A CRC-Based Lightweight Authentication Protocol for EPCglobal Class-1 Gen-2 Tags

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8630))

Abstract

Authentication is one of the most important technologies to protect the privacy and security of RFID systems. The EPCglobal Class-1 Gen-2 specification is an important standard for RFID. The tags conforming to this standard have limited computing and store resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. But this kind of tags is considered as the main stream for RFID applications. In order to solve the secure problems for this kind of RFID tags we propose a lightweight authentication protocol based on CRC, which can assure forward security and prevent information leakage, location tracing, eavesdropping, DOS attack, replay attack, and spoofing. This protocol avoids CRC collision by reasonably dividing the tag’s identification information into two different parts and it enhances the mutual authentication strength between tags and readers by dual authentications. This protocol only uses the computing resources embedded in tags and it is very suitable to low-cost RFID systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nambiar, A.N.: RFID Technology: A Review of its Applications. In: Proceedings of the World Congress on Engineering and Computer Science, vol. II, pp. 1–7. IAENG, Hong Kong (2009)

    Google Scholar 

  2. Gao, L.J., Ma, M.D., Shu, Y.T., Wei, Y.H.: An Ultralightweight RFID Authentication Protocol with CRC and Permutation. Journal of Network and Computer Applications 10, 1–20 (2013)

    Google Scholar 

  3. Kang, S.Y., Lee, D.G., Lee, I.Y.: A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environment. Computer Communications 31, 4248–4254 (2008)

    Article  Google Scholar 

  4. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces 29, 254–259 (2007)

    Article  Google Scholar 

  6. Karthikeyan, S., Nesterenko, M.: RFID Security without Extensive Cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67. ACM, New York (2005)

    Chapter  Google Scholar 

  7. Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of Class 1 GEN-2 RFID Tag against Traceability and Cloning. In: The 2006 Symposium on Cryptography and Information Security, pp. 269–277. Springer, Heidelberg (2006)

    Google Scholar 

  8. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. Computer Standards & Interfaces 31, 372–380 (2009)

    Article  Google Scholar 

  9. Han, D., Kwon, D.: Vulnerability of an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces 31, 648–652 (2009)

    Article  Google Scholar 

  10. Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 43–56. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Hu, T., Wei, G.H.: Anonymous Bidirectional RFID Authentication Protocol Based on Low-cost Tags. Journal of Computer Applications 32(1), 111–114 (2012)

    Google Scholar 

  12. Oh, S., Shin, J., Jeong, C., Lee, J.: A Mutual Authentication Protocol in RFID Using CRC and Variable Certification Key. In: 2012 International Conference on Affective Computing and Intelligent Interaction. Lecture Notes in Information Technology, vol. 10, pp. 84–89. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Shi, Z., Xia, Y., Zhang, Y., Wang, Y., Dai, J. (2014). A CRC-Based Lightweight Authentication Protocol for EPCglobal Class-1 Gen-2 Tags. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8630. Springer, Cham. https://doi.org/10.1007/978-3-319-11197-1_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11197-1_49

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11196-4

  • Online ISBN: 978-3-319-11197-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics