Abstract
Use of multiple Radio Frequency Identification (RFID) tags in an object increases the detection rate in comparison to the single tagged object. Since, more than one tag is involved in the same object; the security such as authentication scheme needs to be revised. The authentication schemes that have been proposed so far are only for single tagged object. Modification of these schemes may be applicable to multi-tag environment. However, the advantage of having more resource (tags) can be utilized to enhance the security. We have used this advantage and proposed an authentication scheme which is not only applicable to multi tag environment but also enhance the security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bolotnyy L, Robins G (2007) Multi-tag RFID systems. J Internet Protoco Technol (IJIPT) 2(3/4):218–231. Special issue on RFID: technologies, applications, and trends
Weis SA, Sarma S, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the first security in pervasive computing, LNCS-2802. Springer, New York
Tan C, Sheng B, Li Q (2007) Serverless search and authentication protocols for RFID. In: Proceedings of the fifth annual IEEE international conference on pervasive computing and communication (PerCom)
Tsudik G (2007) A family of dunces: trivial RFID identification and authentication protocols. In: Proceedings of PET
Burmester M, Van Le T, de Medeiros B (2006) Provably secure ubiquitous systems: universally composable RFID authentication protocols. In: Proceedings of SECURECOMM
Conti M, Di Pietro R, Vincenzo Mancini L (2007) RIPP-FS: an RFID identification, privacy preserving protocol with forward secrecy. In: Proceedings of PerCom’07, pp 229–234
Zhang Y, Li D, Zhu Z (2008) An efficient RFID tag-reader mutual authentication scheme. In: Proceedings of WiCOM’08, pp 1–4
Lei H, Yong G, Zeng-yu C, Na-na L (2009) An improved lightweight RFID protocol using substring. In: Proceedings of the 5th international conference on Wireless communications, networking and mobile computing, pp 3717–3720
Khalili A, Katz J, Arbaugh WA (2003) Toward secure key distribution in truly ad-hoc networks. In: Proceedings of symposium on applications and the internet workshops (SAINT 2003 Workshops), Saint-W, p 342
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Dhal, S., Sengupta, I. (2014). Protocol to Authenticate the Objects Attached with Multiple RFID Tags. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_17
Download citation
DOI: https://doi.org/10.1007/978-81-322-1817-3_17
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1816-6
Online ISBN: 978-81-322-1817-3
eBook Packages: EngineeringEngineering (R0)