An Optimized Novel Secure RFID Authentication Protocol Against Compromised Tag Attack

Download Now
Provided by: IJARSET
Topic: Mobility
Format: PDF
RFID (Radio Frequency IDentification device) is increasingly used in all logistic and automation application. But the privacy and security of the system is a big issue while scanning multiple tags. To preserve the privacy and security, number of authentication protocol has been proposed. All these protocols protect the system from all attacks excluding compromised tag attack. In this paper, the authors demonstrate that the existing system is vulnerable to compromised tag attack. They propose the novel secure RFID authentication protocol based an Elliptic Curve Cryptography (ECC), which prevents the system from compromised tag attack.
Download Now

Find By Topic