Volume : II, Issue : V, May - 2013

Secured Authentication Protocol for RFID System Using XOR Scheme

Mohanavelu S. , Ramya T.

Abstract :

Abstract– In an Authentication process of RFID systems the tag/reader/server communicates over an insecure channel due to “weak” authentication protocols. The EPC–C1G–2 specification has some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed pad generation function is used to improve security. The Pad Gen function is used to produce a cover–coding pad to mask the tag‘s access password before the data transmission. Hence a mutual authentication protocol with XOR scheme is proposed to avoid the data leakage and data traceability during the data transmission .This system model is simulated in Modelsim and synthesized using Xilinx ISE software

Keywords :

Article: Download PDF   DOI : 10.36106/ijsr  

Cite This Article:

Mohanavelu S., Ramya T. Secured Authentication Protocol for RFID System Using XOR Scheme International Journal of Scientific Research, Vol.II, Issue.V May 2013


Number of Downloads : 254


References :