Mobility

Improvement of EPC-C1G2 RFID Authentication Protocols

Free registration required

Executive Summary

The EPC-C1G2 standard is widely regarded as an international mainstream when developing RFID applications due to its major property of lightweight cost. Up to now, many RFID authentication protocols conforming to EPC-C1G2 have been proposed. In 2010, Lo and Yeh proposed an EPC-C1G2 RFID authentication protocol, and employed a formal logic proof to prove the security of their protocol. Herein, the authors show that Lo-Yeh's protocol is vulnerable to an EPC cracking attack, a location tracking attack, and two impersonation attacks.

  • Format: PDF
  • Size: 542.5 KB