IntroductionRadio Frequency Identification (RFID) (Landt, 2001) is a prevalent technology that replaces barcode technology and it will be massively applied in both consumer and commercial products as the trend predicts. However, the computation power and memory of RFID including the EPCGlobal Gen-1 and Gen-2 RFID tags are restricted. These made the implementation of well-known cryptographic algorithms, both computational and memory intensive, on the tags not possible. Although various cryptographic privacy enhancing technologies for RFID have been proposed, they include Hash-lock approaches, Digital Signature approaches, Encryption approaches, Time Stamping approaches, Pseudonyms approaches and Challenge-response approaches, the EPCGlobal tags continue to operate in a limited security protection. The Hash-lock approach (Weis, 2003) is based on locking the tag using a hash of the key on the tag, where the key is stored in a back-end server. This approach assumes that tags can not be operated securely in a long isolated environment. This approach can be used for authentication, by matching the right hash of key. The cloning resistance is weak and enhanced techniques providing better privacy protection and scalability have been derived (An, 2005;Nohara, 2005; Wang, 2007). Digital signatures approaches (Juels, 2003;Bono, 2005;de Dormale, 2005) provide better tracing and forgery resistance of RFID during authentication process. The approaches use a PKI encryption technique to avoid static identifiers and information to be read by others. Authentication is performed by verifying data on the tag is signed using a valid public-key digital signature to check the valididty of authentication. Encryption approaches (Golle, 2004;Feldhofer, 2004;Ranasinghe, 2004;Ateniese, 2005) are similar to digital signature approaches except simplified private key standard or propriertay cryptographic algorithm is used. Time stamping approaches (Glidden, 2004;Molnar ,2005;Tsudik, 2006;Ith, 2007) are the most popular approaches which provide a dynamic matching of time information that help avoiding replay attacks. Pseudonyms approaches (Juels, 2004; Juel, 2006;Molnar, 2005;Avoine, 2005) is very similar to time stamping approaches except the dynamic information is scheduled from a predefined list of pseudo-random data called pseudonynms. Challenge-response approaches (Ree , 2005; Dimitriou, 2006;Duc, 2006;Chien, 2007) are the most secured techniques developed from multi-pass authentication process to provide a wide range of security and privacy protection.Open Access Database www.intechweb.org In actual situation, EPCGlogal Gen 1 (Garcia-Alfaro et al, 2008) tag implementation uses protocols that only require RFID readers to use the tags' unique serial numbers to identify the tags. Tags with the same ID will certainly confuse the reader. Gen 2 rectifies this problem by allowing reader to read tags even if two or more tags have the exact IDs. The unique sequence of communication makes anti-collision algorithm more robust and reduce the possibi...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.