Hardware Implementation of Secured Authentication Protocol for RFID System

In general, during the authentication process of RFID tags the tag/reader/server communicates over an insecure channel due to "Weak" authentication protocols. The Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification have some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication, that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed Pad Generation (Pad Gen) function is used to improve security.

Provided by: International Journal of Engineering Trends and Technology Topic: Mobility Date Added: Feb 2012 Format: PDF

Find By Topic