Intensifying the security in RFID systems

Authors

  • Jose R Research Scholar, KMG College of arts and science, Gudiyatham, 635803, Tamil Nadu, India
  • Anjugam P Research Scholar, KMG College of arts and science, Gudiyatham, 635803, Tamil Nadu, India

Keywords:

RFID, cryptosystems

Abstract

Although promising, RFID is not without its challenges, which arise from both technological and usage point of View. A common concern with RFID is data security. Data Security is a key area in RFID usage; With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology.

References

. L.Tobias, M. Schneider and C. Ruland,"Analysis of power constraints for Cryptographic Algorithms in Mid-Cost RFID Tags,"Lecture Notes in Computer Science, Vol. 3928, pp. 278-288, 2006.

. S.Moon,"Design of a scalable RSA Cryptoprocessor Embedded with an Efficient MAC Unit," in International Conference on Future Generation Communication and Networking, 2008, pp. 74-77.

. S. Wu, Y. Zhu and Q. Pu,"Resource Efficient Hardware Design for RSA,"in Proceedings of the first International Multi-Symposiums on Computer and Computational Sciences, 2006.

. S. Goldwasser and S. Macali,"Probabilistic Encryption," Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270-299, Apr. 1984.

. M. Bolic,"Radio Frequency Identification Technology,"University of Ottawa Course Notes, Sep. 2009.

. N.C. Wu, M.A. Nystrom, T.R. Lin, and H.C. Yu, "Challenges to global RFID adoption,"Technovation, Vol.26, no. 12, pp. 1317-1323, Dec. 2006.

. D. Dobkin and T. Wandinger,"A Radio-Oriented Introduction to Radio Frequency Identification," High Frequency Electronics, pp. 46-51, 2005.

. J. Landt,"The History of RFID,"IEEE Potentials, vol. 24, no. 4, pp. 8-11, Dec. 2005.

. International Standards Organization,"Radiofrequency identification of animals-Advanced transponders---Part 1: Air interface," International Standards Organization Standard 14223-1:2003, 2003.

. International Standards Organization,"Radiofrequency identification of animals-Advanced transponders---Part 2: Code and Command Structure," International Standards Organization Standard 14223-2:2010, 2010.

. International Standards Organization,"Identification card--Contactless integrated circuit cards--Proximity cards--Part 1: Physical Characteristics,"International Standards Organization Standard 14443-1:2000, 2000.

Downloads

Published

2024-02-26

How to Cite

Jose, R., & Anjugam, P. (2024). Intensifying the security in RFID systems. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(11), 2012–2015. Retrieved from https://ijact.in/index.php/j/article/view/352

Issue

Section

Review Article