Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment
نویسندگان
چکیده
Identification is very important nowadays; whether there is need to identify persons, animals or objects, RFIDs provide a very good solution to the problem of identification and authentication. No one can deny the importance of authentication, it is done at the airport, at the railway station, in the library etc, but usually it’s done manually. The proposed system is a low cost automatic identification and authentication system which can be deployed at the doors of the building to authenticate authorized people. RFID based system should be very low cost and reliable for large scale deployment, for example RFID deployment in an airport to identify every official and passenger. The proposed system aims to develop a very low cost RFID authentication system based on the low cost components already available in the market. The complete system costs less than $10 USD. This approach not only reduces the cost but also enhances the reliability and ease of maintenance of the RFID based authentication system. The system is also made resistant against any tampering attempt. The proposed system is also accompanied with the PC interfacing and database logging software; which can be used to see the authentication details of the authenticated tags and as well as logs all the authenticated tags with the date and time of authentication to a database. Low cost antenna is also designed to minimize the cost of the system. While keeping the cost low, an impressive range of 10 cm was achieved using passive RFID tags.
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملM2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technologies in history. This presents a number of advantages, but also opens a huge number of security problems that need to be addressed before its successful deployment. Many proposals have recently appeared, but all of them are based on RFID tags ...
متن کاملRfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Cloud based RFID authentication is becoming a large area of interest among researchers and engineers these days. However, there is not much attention given to the RFID authentication concern. Most of the work done on this issue till now has its focus on RFID functionality without considering security and privacy. Classical RFID authentication schemes do not meet the security and privacy require...
متن کاملCryptanalysis and enhancement of two low cost rfid authentication protocols
Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight antide-synchronization RFID authentication protocol and a lightweight binding proof protocol to g...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2012