Abstract

RFID(Radio Frequency Identification) systems are being used in areas such as identification and authorization. However, RFID systems have many security problems. RFID systems are divided into active tag and passive tag. Due to the computational power of active RFID tags, many studies have been made on them and solutions have been produced. Since passive tags have no computational power, solutions based on strong algorithms can not be produced on these tags. One of the security problems with passive tags, card copying has become possible with devices that anyone can access. The inability to identify the copy card allows continuous access to unwanted areas by unwanted persons. The suggested solution is to override passive RFID tags when they are copied, along with estimating the copy card. The tag holds the value of the new hash, which is randomly generated from the central computer in every successful reading. The generated hash value does not constitute a specific order because it is composed of hash of random texts. With the modified hash value in each reading, the first card read will be treated as the current card, and if another card with the same card number is read, it will be labeled as the copy card.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call