The Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response

Free registration required

Executive Summary

This paper proposes a Radio Frequency IDentification (RFID) access control scheme, which includes not only an authentication mechanism, but also an access right authorization mechanism designed for a low-cost RFID system. The scheme guarantees mutual authentication and location privacy and also resists the man-in-the-middle attack, the spoofed reader attack, and the spoofed tag attack. The authors' scheme is more suitable for meeting future RFID system demands. Radio Frequency IDentification (RFID) technology is becoming widespread in everyday life. RFID systems consist of Radio Frequency (RF) tags, RF readers and a back-end database server. Readers query tags for their contents by broadcasting an RF signal.

  • Format: PDF
  • Size: 514.95 KB