Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2323
Title: Study Of RFID Authentication Protocols
Authors: .Jadhao, Ms. A.G
.P.Ugale, Prof. Dr. S
Keywords: —RFID
Tags, Reader
authentication
performance
privacy
security
Issue Date: 1-Jul-2018
Abstract: For identification of objects and humans, recently we are using a small wireless device which named as RFID. Acceptance of this system is growing day by day in previous few decades and growing with new protocols. It has reduced cost of production and this is the reason that RFID technology and devices are used in the huge mob. As security is the main issue of the communication while doing data transmission in RFID devices. Though RFID is complete wireless network system, security of data is more important. There are many authentication protocols are used for data security from tag to reader communication. Here we have done study of various authentication protocols and what is the requirement of it. Few protocols are providing forward security, performance but lagging in privacy purpose likewise other protocols are doing the same.
URI: http://192.168.3.232:8080/jspui/handle/123456789/2323
Appears in Collections:Study Of RFID Authentication Protocols

Files in This Item:
File Description SizeFormat 
SPU_new_ieee_agjadhao.pdf328.37 kBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.