This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Second-Generation RFID
July/August 2008 (vol. 6 no. 4)
pp. 21-27
Abdul (Ali) Razaq, City University of Hong Kong
Wai Tong Luk, City University of Hong Kong
Kam Man Shum, City University of Hong Kong
Lee Ming Cheng, City University of Hong Kong
Kai Ning Yung, City University of Hong Kong
Current ultra-high frequency air interface protocols help users get the true benefits of second-generation RFID standards. However, these technologies also have some security drawbacks and limitations.

1. S.L. Garfinkel, A. Juels, and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security &Privacy, vol. 3, no. 3, 2005, pp. 34–43.
2. J. Landt, Shrouds of Time: The History of RFID, Assoc. Automatic Identification and Mobility (AIM) Publication, ver. 1.0, 1 Oct. 2001; www.aimglobal.org.
3. ISO/IEC 18000-6:2004/FPDAM 1, Amendment 1, extension with type C and update of type A, ISO/IEG; www.iso.org/iso/iso_catalogue/catalogue_tc catalogue_detail.htm?csnumber=43923.
4. ISO/IEC FDIS 18000-6:2003(E, Information Technology Automatic Identification. and Data Capture Techniques, ISO/IEC,JTC 1/SC 31/WG4, Nov. 2003.
5. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID, EPCglobal, Jan. 2005.
6. M. Roberti, "Understanding the EPC Gen 2 Protocol," RFID J. Special Report,28 Mar. 2005.
7. L. Zongwei, T. Chan, and J.S. Li, "A Lightweight Mutual Authentication Protocol for RFID Networks," Proc. IEEE Int'l Conf. e-Business Eng., IEEE CS Press, 2005, pp. 620–625.
8. A. Juels, "Minimalist Cryptography for Low Cost RFID Tags," Proc. 4th Int'l Conf. Security Comm. Networks, LNCS 3352, Springer-Verlag, 2004, pp. 149–164.
9. D.N. Due et al., "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning," Proc. Symp. Cryptography and Information Security (SCIS 06), Inst. Electronics, Information, and Comm. Eng. (IEICE), 2006; http://caislab.icu.ac.kr/Paper/paper_files/ 2006duc-scis06.pdf.

Index Terms:
EPCglobal, transition from Gen 1 to Gen 2, comparison of RFID standards, ISO 18000-6, RFID, radio frequency identification
Citation:
Abdul (Ali) Razaq, Wai Tong Luk, Kam Man Shum, Lee Ming Cheng, Kai Ning Yung, "Second-Generation RFID," IEEE Security & Privacy, vol. 6, no. 4, pp. 21-27, July-Aug. 2008, doi:10.1109/MSP.2008.94
Usage of this product signifies your acceptance of the Terms of Use.