Secured Authentication Protocol for RFID System Using XOR Scheme

Provided by: Creative Commons
Topic: Networking
Format: PDF
In an authentication process of RFID systems the tag/reader/server communicates over an insecure channel due to "Weak" authentication protocols. The specification has some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed pad generation function is used to improve security. The pad gen function is used to produce a cover-coding pad to mask the tag's access password before the data transmission.

Find By Topic