LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Using Dummy Data for RFID Tag and Reader Authentication

Photo by campaign_creators from unsplash

Abstract Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to… Click to show full abstract

Abstract Radio-Frequency IDentification (RFID) technology is an essential enabler of a multitude of intelligent applications. The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags. In this paper, we proposes an authentication protocol based on monitoring the transmissions between readers and tags in the system. The proposed authentication scheme is based on injecting decoys within the exchanged communications (between RFID readers and tags) and is used in the authentication process. Furthermore, the proposed authentication scheme is mathematically modeled and validated using extensive simulation. The simulations results show that the proposed scheme provides a 100% confidence level in the authentication of tags and detection of compromised readers.

Keywords: using dummy; dummy data; authentication; data rfid; rfid tag; rfid

Journal Title: Digital Communications and Networks
Year Published: 2021

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.