Iran University of Science and Technology
In this paper the authors present new constraints to EPCglobal Class 1 Generation 2 (EPC- C1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead to prevent predecessor's protocols' weaknesses and also present the secure ones. Also in this paper as an example, they use EPC-C1 G2-friendly protocol which has been recently proposed, to show their proposed constraints in EPC-C1 G2 standard. Pang et al.'s protocol security analysis show how its security claim based on un-traceability and resistance against de-synchronization attacks is ruined.