Secured Authentication Protocol for RFID System Using XOR Scheme

In an authentication process of RFID systems the tag/reader/server communicates over an insecure channel due to "Weak" authentication protocols. The specification has some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed pad generation function is used to improve security. The pad gen function is used to produce a cover-coding pad to mask the tag's access password before the data transmission.

Provided by: Creative Commons Topic: Networking Date Added: May 2013 Format: PDF

Find By Topic