Study Of RFID Authentication Protocols

被引:0
|
作者
Jadhao, A. G. [1 ]
Ugale, S. P. [1 ]
机构
[1] KK Wagh Inst Engn Educ & Res, Dept Elect & Telecommun, Nasik 422003, Maharashtra, India
关键词
RFID; Tags; Reader; authentication; performance; privacy; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For identification of objects and humans, recently we are using a small wireless device which named as RFID. Acceptance of this system is growing day by day in previous few decades and growing with new protocols. It has reduced cost of production and this is the reason that RFID technology and devices are used in the huge mob. As security is the main issue of the communication while doing data transmission in RFID devices. Though RFID is complete wireless network system, security of data is more important. There are many authentication protocols are used for data security from tag to reader communication. Here we have done study of various authentication protocols and what is the requirement of it. Few protocols are providing forward security, performance but lagging in privacy purpose likewise other protocols are doing the same.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Untraceable and Serverless RFID Authentication and Search Protocols
    Kim, Zeen
    Kim, Jangseong
    Kim, Kwangjo
    Choi, Imsung
    Shon, Taeshik
    [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 278 - 283
  • [22] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
  • [23] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
  • [24] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920
  • [25] Review of different classes of RFID authentication protocols
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    [J]. WIRELESS NETWORKS, 2019, 25 (03) : 961 - 974
  • [26] Universally Composable RFID Identification and Authentication Protocols
    Burmester, Mike
    Van Le, Tri
    De Medeiros, Breno
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
  • [27] Scalability and Security Conflict for RFID Authentication Protocols
    Erguler, Imran
    Anarim, Emin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 59 (01) : 43 - 56
  • [28] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [29] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [30] More on the Security of Linear RFID Authentication Protocols
    Krause, Matthias
    Stegemann, Dirk
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196