Abstract
EPC class 1 Generation-2 (or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol is known to be insecure. To improve the security of this standard, several protocols have been proposed which are compliant to this standard. In this paper, we analyze the security of a protocol which has been recently proposed by Lo and Yeh (2010). Despite the designers’ claim, which is optimal security, however, we present a passive attack which can retrieve all secret parameters of the tag efficiently. The cost of this attack is eavesdropping only one session of protocol between the tag and a legitimate reader and 216 PRNG-function evaluations in off-line. In addition, we show that an active adversary can retrieve secret parameters more efficiently, that is, with the complexity of two consequence sessions of protocol and without the need for PRNG-function evaluation. The success probability of the given attacks are “1”. To counteract such flaws, we propose an enhanced EPC-compliant protocol entitled YAYA, by applying some minor modifications to the original protocol so that it provides the claimed security properties.




Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bailey DV, Juels A (2006) Shoehorning security into the EPC tag standard. In: Prisco RD, Yung M (eds) SCN, vol 4,116 of Lecture Notes in Computer Science. Springer, Berlin, pp 303–320
Burmester M, de Medeiros B (2008) The security of EPC gen2 compliant RFID protocols. In: Bellovin SM, Gennaro R, Keromytis AD, Yung M (eds) ACNS, vol 5,037 of Lecture Notes in Computer Science. Springer, Heidelberg, pp 490–506
Burmester M, de Medeiros B, Munilla J, Peinado A (2009) Secure EPC gen2 compliant radio frequency identification. In: Ruiz PM, Garcia-Luna-Aceves JJ (eds). ADHOC-NOW, vol 5,793 of Lecture Notes in Computer Science. Springer, Berlin, pp 227–240
Chen C-L, Deng Y-Y (2009) Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Eng Appl AI 22(8):1284–1291
Chien H-Y, Chen C-H (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Stand Interfaces 29(2):254–259
Choi EY, Lee DH, Lim JI (2009) Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems. Comput Stand Interfaces 31(6):1124–1130
Class-1 generation 2 UHF air interface protocol standard version 1.2.0, Gen2, (2008) http://www.epcglobalinc.org/standards/
Habibi MH, Alaghband MR, Aref MR (2011) Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard. In: Ardagna CA, Zhou J (eds) WISTP, vol 6,633 of Lecture Notes in Computer Science. Springer, Berlin, pp 254–263
Habibi MH, Gardeshi M, Alaghband MR (2011) Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. 2(1):1–13, Feb. 04 Comment: 13 page, International Journal of Ubicomp
Information technology? Radio frequency identification for item management? (2005) Part 6: parameters for air interface communications at 860 MHz to 960 MHz. http://www.iso.org
Jin G, Jeong EY, Jung H-Y, Lee KD (2009) RFID authentication protocol conforming to EPC class-1 generation-2 standard. In: Arabnia HR, Daimi K (eds) Security and Management. CSREA Press, USA, pp 227–231
Kim JG, Shin WJ, Yoo JH (2007) Performance analysis of EPC class-1 generation-2 RFID anti-collision protocol. In: Gervasi O, Gavrilova ML (eds) ICCSA (3), vol 4,707 of Lecture Notes in Computer Science. Springer, Berlin, pp 1017–1026
Lo N-W, Yeh K-H (2007) An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system. In: Denko MK, Shih C-S, Li K-C, Tsao S-L, Zeng Q-A, Park S-H, Ko Y-B, Hung S-H, Park JH (eds) EUC Workshops, vol 4,809 of Lecture Notes in Computer Science. Springer, pp 43–56
Lo N-W, Yeh K-H (2010) A secure communication protocol for EPCglobal Class 1 Generation 2 RFID systems. In: IEEE 24th international conference on advanced information networking and applications workshops, IEEE pp 562–566
Peris-Lopez P, Castro JCH, Estévez-Tapiador JM, Ribagorda A (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput Stand Interfaces 31(2):372–380
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2008) RFID specification revisited. In: Yan L, Zhang Y, Yang LT, Ning H (eds) The internet of things: from RFID to the next-generation pervasive networked systems. Taylor & Francis Group, London, pp 311–346
Peris-Lopez P, Hernandez-Castro JC, Tapiador JE, van der Lubbe JCA (2011) Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol. Eng Appl AI 24(6):1061–1069
Peris-Lopez P, Li T, Hernandez-Castro JC (2010) Lightweight props on the weak security of EPC class-1 generation-2 standard. IEICE Trans 93-D(3):518–527
Peris-Lopez P, Li T, Hernandez-Castro JC, Tapiador JE (2009) Practical attacks on a mutual authentication scheme under the EPC class-1 generation-2 standard. Comput Commun 32(7-10):1185–1193
Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov A (ed) FSE, vol 4,593 of Lecture Notes in Computer Science. Springer, Berlin, pp 181–195
Yeh K-H, Lo N-W (2009) Improvement of an EPC gen2 compliant RFID authentication protocol. In: IAS. IEEE Computer Society, pp 532–535
Yeh T-C, Wang Y-J, Kuo T-C, Wang S-S (2010) Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 37(12):7678–7683
Yoon E-J (2011) Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications, In Press, Corrected Proof
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bagheri, N., Safkhani, M. & Naderi, M. Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol. Neural Comput & Applic 24, 799–805 (2014). https://doi.org/10.1007/s00521-012-1283-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-012-1283-9