An Authentication Protocol Based on Combined RFID-Biometric System

  • Chikouche N
  • Cherif F
  • Benmohammed M
N/ACitations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Our protocol requires a PRNG (Pseud-Random Number Generator), a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Chikouche, N., Cherif, F., & Benmohammed, M. (2012). An Authentication Protocol Based on Combined RFID-Biometric System. International Journal of Advanced Computer Science and Applications, 3(4). https://doi.org/10.14569/ijacsa.2012.030411

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

67%

Professor / Associate Prof. 1

17%

Lecturer / Post doc 1

17%

Readers' Discipline

Tooltip

Computer Science 12

80%

Engineering 2

13%

Mathematics 1

7%

Save time finding and organizing research with Mendeley

Sign up for free