Method of Secret Splitting: Novel Way to Authenticate RFID Tags and Reader

Date Added: Jun 2012
Format: PDF

A globally accepted, auto-identification technology, became popular in the post World War II period - the RFID technology works without any contact between the participating entities. As an auto-identification technology, RFID has overcome the demerits of barcodes. RFID find its applications in pharmaceuticals, animal tracking, and inventory control to name a few. However, inspite of its huge area of applications, deploying RFID technology has become a great challenge for the organizations. In many cases, either the reader is not properly authenticated or tags are not authenticated, due to which malicious tags easily communicate with the reader.