A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Ultralightweight RFID Reader-Tag Mutual Authentication
2015
2015 IEEE 39th Annual Computer Software and Applications Conference
In an RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks, leading to privacy and security weakness. Typical attacks include the forged-tag,
doi:10.1109/compsac.2015.106
dblp:conf/compsac/HuangJ15
fatcat:yvn4uakbpzc4vdfqtj6v5e52oy