Abstract
Although several mutual authentication protocols which use a back-end server to retrieve a tagpsilas data have been proposed in RFID systems, many of them do not take the resources of back-end server into consideration. They use sequential search in database to carry out the authentication process. In this paper, we survey the existing mutual authentication protocols for RFID systems and propose some remedies for these protocols especially with a special focus on the sequential search problem. After they are remedied, these protocols not only keep their properties such as anonymity and privacy but also increase the performance on the database search in the back-end server.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.