ARM and FPGA Implementation of Secured Authentication Protocol for RFID System

Provided by: International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE)
Topic: Security
Format: PDF
The authentication process of RFID tag's the tag/reader and server communicates over an insecure channel due to weak authentication protocols. The Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification have some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication, that allow hackers to deduce or guess the password. To overcome this weak authentication, a specially designed Pad Generation (Pad Gen) function is used to improve security.

Find By Topic