Descripción
|
|
---|---|
The authentication protocols for RFID systems are vital security procedures aimed to pro- tect user privacy and remove other security vulnerabilities. Various authentication protocols have been developed in order to enable reliable authentication of RFID system components and to provide object identi¯cation. The major challenge in the design of these protocols is to achieve the balance between required security level and the limited computational capabilities of RFID devices. As there are di®erent types of RFID tags that have to bear in mind when designing the authentication protocols the care also has to be taken about the requirements of speci¯c RFID application. Most of the RFID tags are low-cost devices with limited resources that cannot a®ord standard cryptographic operations but there are also some RFID tags with certain level of embedded cryptographic capabilities. Having in mind these di®erent types of tags, the most relevant RFID authentication protocols are presented in this chapter. | |
Internacional
|
No |
DOI
|
|
Edición del Libro
|
0 |
Editorial del Libro
|
Auerbach Publications, Taylor & Francis Group |
ISBN
|
978-1-42006839-9 |
Serie
|
|
Título del Libro
|
Security in RFID and Sensor Networks |
Desde página
|
99 |
Hasta página
|
120 |