TRMA: An efficient approach for mutual authentication of RFID wireless systems

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In today’s world, transmission and reception of data secrecy are the foremost concerns in wireless communication. Recently Radio Frequency Identification (RFID) has perceived the massive amount of attention as it inhibits privacy invasions and data disclosure. An entire generation of new security and privacy attacks might arise as the RFID technologies have a widespread deployment all over. One of the significant drawbacks in RFIDs are the unsteady authentication, either the password itself is leaked else data among the reader and a tag. Also, researchers have observed that there are threatening security drawbacks in Electronic Product Code-Class I Generation 2 (EPC-C1G2). To overcome this issue, a function called as the Pad Generation is used that assists in refining the security parameter in the mutual authentication scheme. This paper stresses on Tag-Reader Mutual Authentication (TRMA) - system of RFID tag-reader with the modified version of PadGen. The modified Pad-Gen design uses XOR operation for the RIFD-TRMA protocol. For the cost-effective hardware implementation, the proposed framework is simulated on FPGA Artix7-XC7A100T-3CSG324 device and physically verified on Chip scope pro tool.

Cite

CITATION STYLE

APA

Anusha, R., & Veena Devi Shastrimath, V. (2019). TRMA: An efficient approach for mutual authentication of RFID wireless systems. In Advances in Intelligent Systems and Computing (Vol. 765, pp. 290–299). Springer Verlag. https://doi.org/10.1007/978-3-319-91192-2_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free