Abstract
Radio Frequency Identification (RFID) has a great impact on our daily lives. Its fast, efficient, simple, non-visual reading and ability to adapt to a variety of harsh environments make it popular with all walks of life. At present, RFID is used in logistics, military security, identification, industrial control, retail, anti-theft, anti-counterfeiting and many other fields. However, due to its characteristics of no need to touch, no need for visual, wireless transmission, signal broadcasting, and limited resources, RFID technology has potential safety hazards. This paper reviewed the research status of RFID system authentication protocols. We presented the components of the RFID system and discuss a taxonomy of authentication protocol for the RFID system which mainly based on Hash, Elliptic Curve cryptography (ECC) and Physical unclonable function(PUF). This paper also presented three factors that affect the performance of the authentication protocol and presented a proposal.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.