The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2008 vol.6)
pp: 21-27
Abdul (Ali) Razaq , City University of Hong Kong
Wai Tong Luk , City University of Hong Kong
Kam Man Shum , City University of Hong Kong
Lee Ming Cheng , City University of Hong Kong
Kai Ning Yung , City University of Hong Kong
Current ultra-high frequency air interface protocols help users get the true benefits of second-generation RFID standards. However, these technologies also have some security drawbacks and limitations.
EPCglobal, transition from Gen 1 to Gen 2, comparison of RFID standards, ISO 18000-6, RFID, radio frequency identification
Abdul (Ali) Razaq, Wai Tong Luk, Kam Man Shum, Lee Ming Cheng, Kai Ning Yung, "Second-Generation RFID", IEEE Security & Privacy, vol.6, no. 4, pp. 21-27, July/August 2008, doi:10.1109/MSP.2008.94
1. S.L. Garfinkel, A. Juels, and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security &Privacy, vol. 3, no. 3, 2005, pp. 34–43.
2. J. Landt, Shrouds of Time: The History of RFID, Assoc. Automatic Identification and Mobility (AIM) Publication, ver. 1.0, 1 Oct. 2001;
3. ISO/IEC 18000-6:2004/FPDAM 1, Amendment 1, extension with type C and update of type A, ISO/IEG; catalogue_detail.htm?csnumber=43923.
4. ISO/IEC FDIS 18000-6:2003(E, Information Technology Automatic Identification. and Data Capture Techniques, ISO/IEC,JTC 1/SC 31/WG4, Nov. 2003.
5. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID, EPCglobal, Jan. 2005.
6. M. Roberti, "Understanding the EPC Gen 2 Protocol," RFID J. Special Report,28 Mar. 2005.
7. L. Zongwei, T. Chan, and J.S. Li, "A Lightweight Mutual Authentication Protocol for RFID Networks," Proc. IEEE Int'l Conf. e-Business Eng., IEEE CS Press, 2005, pp. 620–625.
8. A. Juels, "Minimalist Cryptography for Low Cost RFID Tags," Proc. 4th Int'l Conf. Security Comm. Networks, LNCS 3352, Springer-Verlag, 2004, pp. 149–164.
9. D.N. Due et al., "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning," Proc. Symp. Cryptography and Information Security (SCIS 06), Inst. Electronics, Information, and Comm. Eng. (IEICE), 2006; 2006duc-scis06.pdf.
43 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool