Skip to main content

Protocol to Authenticate the Objects Attached with Multiple RFID Tags

  • Conference paper
  • First Online:
Emerging Trends in Computing and Communication

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 298))

Abstract

Use of multiple Radio Frequency Identification (RFID) tags in an object increases the detection rate in comparison to the single tagged object. Since, more than one tag is involved in the same object; the security such as authentication scheme needs to be revised. The authentication schemes that have been proposed so far are only for single tagged object. Modification of these schemes may be applicable to multi-tag environment. However, the advantage of having more resource (tags) can be utilized to enhance the security. We have used this advantage and proposed an authentication scheme which is not only applicable to multi tag environment but also enhance the security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bolotnyy L, Robins G (2007) Multi-tag RFID systems. J Internet Protoco Technol (IJIPT) 2(3/4):218–231. Special issue on RFID: technologies, applications, and trends

    Google Scholar 

  2. Weis SA, Sarma S, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the first security in pervasive computing, LNCS-2802. Springer, New York

    Google Scholar 

  3. Tan C, Sheng B, Li Q (2007) Serverless search and authentication protocols for RFID. In: Proceedings of the fifth annual IEEE international conference on pervasive computing and communication (PerCom)

    Google Scholar 

  4. Tsudik G (2007) A family of dunces: trivial RFID identification and authentication protocols. In: Proceedings of PET

    Google Scholar 

  5. Burmester M, Van Le T, de Medeiros B (2006) Provably secure ubiquitous systems: universally composable RFID authentication protocols. In: Proceedings of SECURECOMM

    Google Scholar 

  6. Conti M, Di Pietro R, Vincenzo Mancini L (2007) RIPP-FS: an RFID identification, privacy preserving protocol with forward secrecy. In: Proceedings of PerCom’07, pp 229–234

    Google Scholar 

  7. Zhang Y, Li D, Zhu Z (2008) An efficient RFID tag-reader mutual authentication scheme. In: Proceedings of WiCOM’08, pp 1–4

    Google Scholar 

  8. Lei H, Yong G, Zeng-yu C, Na-na L (2009) An improved lightweight RFID protocol using substring. In: Proceedings of the 5th international conference on Wireless communications, networking and mobile computing, pp 3717–3720

    Google Scholar 

  9. Khalili A, Katz J, Arbaugh WA (2003) Toward secure key distribution in truly ad-hoc networks. In: Proceedings of symposium on applications and the internet workshops (SAINT 2003 Workshops), Saint-W, p 342

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhasish Dhal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Dhal, S., Sengupta, I. (2014). Protocol to Authenticate the Objects Attached with Multiple RFID Tags. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1817-3_17

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1816-6

  • Online ISBN: 978-81-322-1817-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics