@article { author = {Sajjadi Ghaemmaghami, S. and Haghbin, A. and Mirmohseni, M.}, title = {Traceability improvements of a new RFID protocol based on EPC C1 G2}, journal = {The ISC International Journal of Information Security}, volume = {8}, number = {2}, pages = {105-114}, year = {2016}, publisher = {Iranian Society of Cryptology}, issn = {2008-2045}, eissn = {2008-3076}, doi = {10.22042/isecure.2016.8.2.2}, abstract = {Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we show that the Yu-Jehn protocol is vulnerable to secret parameter reveal attack, traceability attacks, forward traceability attack and it also does not provide the privacy of RFID users. To enhance the privacy of the analyzed protocol, an improved version of the protocol is proposed which eliminates the existing weaknesses of Yu-Jehn protocol.}, keywords = {RFID Authentication Protocols,Privacy,Traceability Attack,Forward Traceability Attack,Ouafi-Phan Privacy Model}, url = {https://www.isecure-journal.com/article_41780.html}, eprint = {https://www.isecure-journal.com/article_41780_492aa0b0ad466b133e330f0524e13422.pdf} }