Download now Free registration required
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. This paper proposes a more flexible authentication protocol that provides comparable protection without the need for a central database. This paper also suggests a protocol for secure search for RFID tags.
- Format: PDF
- Size: 166.9 KB