By Topic

A server centric authentication protocol for a RFID system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Chavan, K.P. ; Dept. of Mech. & Ind. Eng., Northeastern Univ., Boston, MA, USA ; Zeid, A. ; Kamarthi, S.

A large scale implementation of RFID technology in many practical applications including supply chain and retail stores require the resolution of the either-or dichotomy between low-cost RFID tags and secure RFID systems. This research proposes an approach in which the complexity and hence the cost of RFID tags can be drastically reduce by eliminating the security-assuring computational resources from the RFID tags and placing the security burden on the data processing server. This approach can make it possible to carry out secure transactions even with simple and inexpensive RFID tags. This research investigates a multiple ID authentication protocol based on this approach. The paper presents an empirical formula for the prediction of the performance of the protocol in terms of the number of spoofs per transaction for a given protocol configuration.

Published in:

Automation Science and Engineering, 2009. CASE 2009. IEEE International Conference on

Date of Conference:

22-25 Aug. 2009