Download now Free registration required
Security in passive resource-constrained Radio Frequency IDentification (RFID) tags is of much interest nowadays. Supply-chain, inventory management is the areas where low-cost and secure batch-mode authentication of RFID tags is required. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a tracking, cloning, and replay attack resistant low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP. However, resistance against timing attack is very important for timestamp-based schemes, and the timestamps should be renewed in regular intervals to keep the tags operative.
- Format: PDF
- Size: 312.3 KB