Abstract
Title: Security in RFID and Mobile Networks
RFID technology defeats bar code reader in respect to the efficient reading capability
and it does not need line of sight constraint. Therefore, the objects are tagged
by RFID device which contains the information related to the object. Sometimes,
the information related to an object is such that the RFID device is unable to contain
the whole. For those objects, a backend data base is used to keep the relevant
information. The tag only keeps the key information. RFID reader reads the key
information and consult with the backend database for the detail information. The
information related to the objects may be secret and hence the access need to be
secure. Therefore, security such as privacy, authentication, integrity etc are the
basic requirements for these devices. We are focusing on the authentication issues.
Use of multiple RFID tags in an object increases the
detection rate in comparison to the single tagged object. Since, more than one tags
are involved in the same object, the security such as authentication scheme needs
to be revised. Our objective is to build a lightweight authentication scheme which will give maximum security in respect to the authentication to the RFID communication. Back to [Research Page]