Hardware Implementation of Secured Authentication Protocol for RFID System

Provided by: International Journal of Engineering Trends and Technology Topic: Mobility Format: PDF
In general, during the authentication process of RFID tags the tag/reader/server communicates over an insecure channel due to "Weak" authentication protocols. The Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification have some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication, that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed Pad Generation (Pad Gen) function is used to improve security.

Find By Topic