Mobility Investigate

Scalability and Security Conflict for RFID Authentication Protocols

Download now Free registration required

Executive Summary

Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as in tag identification or authentication phase they require a linear search depending on number of tags in the system. Recently, new authentication protocols have been presented to solve scalability issue, i.e. they require constant time for tag identification with providing security.

  • Format: PDF
  • Size: 190.9 KB