Quantifying Cryptographic Techniques in Radio Frequency Identification Protocols and Ways of Remedying the Security Threats
Critical examinations concerning the Radio Frequency Identification security and privacy have determined wide analysis over the time. RFID applications have always assumed two important hierarchies: structures aiming to offer security to RFID systems and structures aiming to offer functionality, with no security issues. A way of creating radio frequency identification systems more secure relies on cryptography. Nine RFID protocols of identification and authentication are examined in this paper, so as to analyze the strong points and to find solutions for the weak or jeopardizing points that threaten the security and privacy of RFID systems.