Academic Journals Database
Disseminating quality controlled scientific knowledge

A SIP Based Authentication Scheme for RFID Systems

Author(s): Shruti S.Utpat , Parikshit N.Mahalle.

Journal: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
ISSN 2278-1323

Volume: 1;
Issue: 8;
Start page: 302;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Secure authentication protocol | tag level counter | TRAP family of protocols.

In today’s world of technology the biggest challengefor RFID technology is to provide benefits without threateningthe privacy of consumers and providing secure authenticationfor RFID tags. Previously many solutions had suggested butthere were many ways to break them. An approach of TRAPfamily of protocols by Tsudik seems to provide secureauthentication but it is vulnerable to Denial-Of-Service (DOS)and replay attacks. This paper presents a novel method forsecure authentication of RFID tags using cryptographicapproach. The protocol is an improved version of YA-TRAPand YA-TRAP* family of authentication protocols. Theproposed protocol is SIP based implementation aims toauthentication of RFID tags.SIP provides benefit of running aparticular session for one tag. The protocol can be applicablefor tracking applications. The main contribution is to resistattacks on RFID systems.
Why do you need a reservation system?      Affiliate Program