Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10609/109802
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorMelià-Seguí, Joan-
dc.contributor.authorGarcia-Alfaro, Joaquin-
dc.contributor.authorHerrera-Joancomartí, Jordi-
dc.contributor.otherUniversitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3)-
dc.contributor.otherInstitut Mines-Télécom-
dc.contributor.otherUniversitat Autònoma de Barcelona (UAB)-
dc.date.accessioned2020-02-18T08:23:46Z-
dc.date.available2020-02-18T08:23:46Z-
dc.date.issued2010-11-26-
dc.identifier.citationMelià Seguí, J., García Alfaro, J. & Herrera-Joancomartí, J. (2011). A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags. Wireless Personal Communications, 59(1), 27-42. doi: 10.1007/s11277-010-0187-1es
dc.identifier.issn0929-6212MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/109802-
dc.description.abstractThe Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain. It is designed to balance cost and functionality. As a consequence, security on board of EPC Gen2 tags is often minimal. It is, indeed, mainly based on the use of on board pseudorandomness, used to obscure the communication between readers and tags; and to acknowledge the proper execution of password-protected operations. In this paper, we present a practical implementation attack on a weak pseudorandom number generator (PRNG) designed specifically for EPC Gen2 tags. We show that it is feasible to eavesdrop a small amount of pseudorandom values by using standard EPC commands and using them to determine the PRNG configuration that allows to predict the complete output sequence.en
dc.format.mimetypeapplication/pdf-
dc.language.isoeng-
dc.publisherWireless Personal Communications-
dc.relation.ispartofWireless Personal Communications, 2011, 59(1)-
dc.relation.urihttps://doi.org/10.1007/s11277-010-0187-1-
dc.rightsCC BY-NC-ND-
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/-
dc.subjectRFIDen
dc.subjectEPC Gen2en
dc.subjectPRNGen
dc.subjectsecurityen
dc.subjecteavesdroppingen
dc.subjectattacken
dc.subjectimplementationen
dc.subjectRFIDca
dc.subjectRFIDes
dc.subjectEPC Gen2ca
dc.subjectEPC Gen2es
dc.subjectPRNGca
dc.subjectPRNGes
dc.subjectseguretatca
dc.subjectseguridades
dc.subjectespionatgeca
dc.subjectespionajees
dc.subjectatacca
dc.subjectataquees
dc.subjectimplementacióca
dc.subjectimplementaciónes
dc.subject.lcshComputer securityen
dc.titleA practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags-
dc.typeinfo:eu-repo/semantics/article-
dc.subject.lemacSeguretat informàticaca
dc.subject.lcshesSeguridad informáticaes
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess-
dc.identifier.doi10.1007/s11277-010-0187-1-
dc.gir.idAR/0000002332-
dc.relation.projectIDinfo:eu-repo/grantAgreement/CONSOLIDER CSD2007-00004 ARES-
dc.relation.projectIDinfo:eu-repo/grantAgreement/TSI2007-65406-C03-03 E-AEGIS-
dc.type.versioninfo:eu-repo/semantics/acceptedVersion-
Aparece en las colecciones: Articles cientÍfics
Articles

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
Melia_Garcia_Herrera_WPC_2010_post.pdfPost-print280,73 kBAdobe PDFVista previa
Visualizar/Abrir