Download now Free registration required
Radio Frequency IDentification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, the authors mention the limitation of resources (memory, energy). Their work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Their protocol requires a PRNG (Pseud-Random Number Generator), a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, they will use AVISPA and SPAN tools to verify the authentication and the secrecy.
- Format: PDF
- Size: 591.35 KB