A RFID Authentication Protocol

GUAN Yu

Computer & Telecommunication ›› 2018, Vol. 1 ›› Issue (4) : 31-33.

Computer & Telecommunication ›› 2018, Vol. 1 ›› Issue (4) : 31-33.

A RFID Authentication Protocol

  • GUAN Yu
Author information +
History +

Abstract

RFID system generally includes three parts: tag, reader and database, where there is the hidden danger between tags and reader through wireless communication. In order to ensure the security of communication information, a bidirectional authentication protocol which is suitable for label and reader is proposed, which can solve the problem of security hidden danger. Bidirectional authentication protocol adopts the mechanism of transmission after message encryption, which makes the attacker eavesdropping information is not clear, thus ensuring the security of information.

Key words

Radio Frequency Identification (RFID) / tag / radio frequency system

Cite this article

Download Citations
GUAN Yu. A RFID Authentication Protocol[J]. Computer & Telecommunication. 2018, 1(4): 31-33

Accesses

Citation

Detail

Sections
Recommended

/