A survey of RFID authentication protocols
MetadataShow full item record
Copyright 2008 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study two main RFID authentication protocols namely LMAP and M2MAP
Showing items related by title, author, creator and subject.
Han, Song; Dillon, Tharam S.; Potdar, Vidyasagar; Chang, Elizabeth (2013)RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues ...
Han, Song; Dillon, Tharam S.; Chang, Elizabeth (2007)Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, ...
Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2007)In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification ...