DocumentCode :
612306
Title :
On security with the new Gen2 RFID security framework
Author :
Engels, D.W. ; You Sung Kang ; Junyu Wang
Author_Institution :
Comput. Sci. & Eng. Dept., Southern Methodist Univ., Dallas, TX, USA
fYear :
2013
fDate :
April 30 2013-May 2 2013
Firstpage :
144
Lastpage :
151
Abstract :
Radio frequency identification (RFID) systems compliant to the EPCglobal Generation 2 (Gen2) passive UHF RFID protocol are being deployed in a broad range of applications including access control, automated tolling, personal identification, anti-counterfeiting, and supply chain management. With the broad applications and the demand for ever increasing amounts of on-tag functionality, security on the tag has become a critical enabling functionality in many applications. To address this growing marketplace need, EPCglobal is developing a standard security framework within which security functionality may be integrated seamlessly into the Gen2 protocol. We review the proposed Gen2 security framework and introduce example cryptographic suites to illustrate how to utilize this framework to provide a range of security functionality. We analyze the security of the Gen2 protocol and this new functionality in the context of timing-based attacks. We conclude that the tight communication timings specified in the Gen2 protocol mitigate timing-based attacks; however, the loose timing implementations on commercial interrogators and limited timing enforcement on tags lesson the effectiveness of the specified timing constraints. Further, we conclude that the new security framework allows for the efficient integration of secure functionality that, as specified, is resistant to timing-based attacks; however, we caution that using the delayed response of the new Gen2 security functionality creates new vulnerabilities to timing based attacks such as relay attacks and man-in-the-middle attacks.
Keywords :
authorisation; computer crime; protocols; radiofrequency identification; telecommunication security; EPCglobal generation 2 passive UHF RFID protocol; Gen2 protocol; Gen2 security framework; New Gen2 RFID security framework; access control; anticounterfeiting; automated tolling; cryptographic suites; limited timing enforcement; loose timing implementations; marketplace need; on-tag functionality; personal identification; radiofrequency identification systems; secure functionality; standard security framework; supply chain management; tight communication timings; timing constraints; timing-based attacks; Authentication; Cryptography; Passive RFID tags; Protocols; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
RFID (RFID), 2013 IEEE International Conference on
Conference_Location :
Penang
Print_ISBN :
978-1-4673-5748-7
Electronic_ISBN :
978-1-4673-5749-4
Type :
conf
DOI :
10.1109/RFID.2013.6548148
Filename :
6548148
Link To Document :
بازگشت