Mobility

A Secure and Efficient Authentication Protocol for Passive RFID Tags

Download Now Free registration required

Executive Summary

At the onset of the ubiquitous computing era, systems need to respond to a variety of challenges, in order to capitalize on the benefits of pervasiveness. One of the pivotal enablers of pervasive computing is the RFID technology which can be successfully applied in numerous applications. However, the interaction of such applications with sensitive personal data renders the need for assuring confidentiality a sine qua non. The native limitations in computing resources, i.e., computational power, memory etc, that characterize nearly all classes of RFID tags make the development of custom-tailored RFID security protocols a troublesome yet challenging task. In this paper, the authors propose a mutual authentication protocol for low cost RFID tags and readers.

  • Format: PDF
  • Size: 244.8 KB