首页 | 本学科首页   官方微博 | 高级检索  
     


Using dummy data for RFID tag and reader authentication
Affiliation:1. Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, 21163, Jordan;2. Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville, 72701, AR, USA
Abstract:Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system. The proposed authentication scheme is based on injecting decoys within the exchanged communications (between RFID readers and tags) and is used in the authentication process. Furthermore, the proposed authentication scheme is mathematically modeled and validated using extensive simulation. The simulations results show that the proposed scheme provides a 100% confidence level in the authentication of tags and detection of compromised readers.
Keywords:RFID  Authentication  Dummy data  Security  Decoys
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号