Volume : II, Issue : V, May - 2013
Secured Authentication Protocol for RFID System Using XOR Scheme
Mohanavelu S. , Ramya T.
Abstract :
Abstract– In an Authentication process of RFID systems the tag/reader/server communicates over an insecure channel due to “weak” authentication protocols. The EPC–C1G–2 specification has some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed pad generation function is used to improve security. The Pad Gen function is used to produce a cover–coding pad to mask the tag‘s access password before the data transmission. Hence a mutual authentication protocol with XOR scheme is proposed to avoid the data leakage and data traceability during the data transmission .This system model is simulated in Modelsim and synthesized using Xilinx ISE software
Keywords :
Article:
Download PDF
DOI : 10.36106/ijsr
Cite This Article:
Mohanavelu S., Ramya T. Secured Authentication Protocol for RFID System Using XOR Scheme International Journal of Scientific Research, Vol.II, Issue.V May 2013
Number of Downloads : 294
References :
Mohanavelu S., Ramya T. Secured Authentication Protocol for RFID System Using XOR Scheme International Journal of Scientific Research, Vol.II, Issue.V May 2013
Our Other Journals...
-
Indian Journal of
Applied Research Visit Website -
PARIPEX Indian Journal
of Research Visit Website -
Global Journal for
Research Analysis Visit Website