1. A Secure Mutual Authentication Protocol to Maintain Synchrony Conforming to EPC Gen2V2 Standard
- Author
-
Baoying Li, Xin Zhao, Jin Guiyue, Jin Jiyu, Jun Mou, and Peng Li
- Subjects
Challenge-Handshake Authentication Protocol ,Protocol (science) ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mutual authentication ,Computer security ,computer.software_genre ,Authentication protocol ,Mutual authentication protocol ,Lightweight Extensible Authentication Protocol ,Rfid authentication ,business ,Interrogation ,computer ,Computer network - Abstract
Designing secure RFID protocols for EPC Gen2V2 Standard is a challenging work. To solve the problems, recently many mutual authentication protocols have been proposed. However, many of them do not maintain synchrony of the records every interrogation. In this paper, we analyze the recently proposed RFID authentication protocols and show that there is the weakness. And we propose a new mutual authentication protocol for EPC Gen2V2 Standard to maintain synchrony. Furthermore, we analyze our protocol from security and privacy, and it shows that the proposed protocol is secure and effective.
- Published
- 2017
- Full Text
- View/download PDF