Method of Secret Splitting: Novel Way to Authenticate RFID Tags and Reader

A globally accepted, auto-identification technology, became popular in the post World War II period - the RFID technology works without any contact between the participating entities. As an auto-identification technology, RFID has overcome the demerits of barcodes. RFID find its applications in pharmaceuticals, animal tracking, and inventory control to name a few. However, inspite of its huge area of applications, deploying RFID technology has become a great challenge for the organizations. In many cases, either the reader is not properly authenticated or tags are not authenticated, due to which malicious tags easily communicate with the reader.

Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE) Topic: Mobility Date Added: Jun 2012 Format: PDF

Download Now

Find By Topic