2011 | OriginalPaper | Buchkapitel
Inclusion/Exclusion Protocol for RFID Tags
verfasst von : Selwyn Piramuthu
Erschienen in: Advanced Computing
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
It is not uncommon to encounter objects with several RFID tags. However, the tags on these objects are generally mobile and move from or to (or, both) the object. No existing RFID authentication protocol considers this scenario. Moreover, an authentication protocol in such a scenario has the potential to be vulnerable to relay attacks where a tag that is not present on the object may pretend to be present. We present an authentication protocol that facilitates inclusion as well as exclusion of RFID tags on an object while simultaneously providing immunity to relay attacks.