Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Protocols for RFID tag/reader authentication
Decision Support Systems
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
Computer Communications
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
Secure EPC Gen2 Compliant Radio Frequency Identification
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
Engineering Applications of Artificial Intelligence
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Performance analysis of EPC class-1 generation-2 RFID anti-collision protocol
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
An extensible and ubiquitous RFID management framework over next-generation network
International Journal of Communication Systems - Part 2: Next Generation Networks (NGNs)
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
International Journal of Communication Systems - Part 2: Next Generation Networks (NGNs)
RFID mutual authentication protocols
Decision Support Systems
Adaptive knowledge-based system for health care applications with RFID-generated information
Decision Support Systems
Lightweight and provably secure user authentication with anonymity for the global mobility network
International Journal of Communication Systems
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
International Journal of Communication Systems
Engineering Applications of Artificial Intelligence
A hidden mutual authentication protocol for low-cost RFID tags
International Journal of Communication Systems
Expert Systems with Applications: An International Journal
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols
Journal of Medical Systems
Dual-reader wireless protocols for dense active RFID identification
International Journal of Communication Systems
Hi-index | 0.00 |
In this paper, we analyze the security of AZUMI protocol which is compliant with EPC-Class-1 Generation-2 standard and recently has been proposed by Peris et al. This protocol is an improvement to a protocol proposed by Chen and Deng which has been cryptanalysed by Peris et al. and Kapoor and Piramuthu. However, our security analysis clearly shows that the designers were not successful in their attempt to improve Chen and Deng protocol. More precisely, we present an efficient passive attack to disclose the tag and the reader secret parameters, due to PRNG and the length of the values. In addition, we present a simple tag impersonation attack against this protocol. The success probability of all attacks are almost "1" and the cost of given attacks are at most eavesdropping two sessions of protocol. However, the given secrets disclosure attack also requires $$O(2^{16})$$ off-line evaluations of a $$PRNG$$ function. To counteract such flaws, we improve the AZUMI protocol by applying some minor modifications so that it provides the claimed security properties.