Loading

Effective Anonymous Approach for Implementing RFID Reciprocated Endorsement Protocol
B.Kavipriya1, S.Dhivya2, J.Sivasankari3, S.Sheik Farith4, A.Jasmine5
1B.Kavipriya,  ECE, UCETW, Madurai , Tamil Nadu, India.
2S.Dhivya, ECE, UCETW, Madurai, Tamil Nadu, India.
3J.Sivasankari, ECE, UCETW, Madurai, Tamil Nadu, India.
4S,Sheik Farith, EEE, CIET, Coimbatore, Tamil Nadu, India.
5A.Jasmine, ECE, CIET, Coimbatore, Tamil Nadu, India.
Manuscript received on January 25, 2014. | Revised Manuscript received on February 13, 2014. | Manuscript published on February 28, 2014. | PP: 6-9 | Volume-3, Issue-3, February 2014. | Retrieval Number:  B2444123213/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Radio-frequency identification (RFID) is a wireless technology that utilizes radio communication to identify objects with a unique electrical identity. The widespread deployment of RFID technologies may generate new threats to security and user privacy. One of the main drawbacks of RFID technology is the weak authentication systems between a reader and a tag. In general, “weak” authentication systems that either leak the password directly over the network or leak sufficient information while performing authentication allow intruders to deduce or guess the password. In this paper, we study the RFID tag–reader mutual authentication scheme using protocol. A hardware implementation of the mutual authentication protocol for the RFID system is proposed. The proposed system was simulated using Modelsim XE II and synthesized using libero synthesis technology. The system hasbeen successfully implemented in hardware using prosaic nano chip using a FPGA.
Keywords: Field-programmable gate array (FPGA) implementation, Mutual authentication, Radio-frequency identification(RFID).