Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi
{"title":"A Robust Lightweight Solution for RFID Security","authors":"Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi","doi":"10.1109/AINAW.2007.48","DOIUrl":null,"url":null,"abstract":"The ubiquitous adoption of RFID technology is becoming integral part of our life. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and testing to become less susceptible to attacks without compromising the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. In this paper, we present a more persistent solution that provides security without compromising the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINAW.2007.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The ubiquitous adoption of RFID technology is becoming integral part of our life. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and testing to become less susceptible to attacks without compromising the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. In this paper, we present a more persistent solution that provides security without compromising the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks.