IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Identification and Authentication for RFID Systems

Identification and Authentication for RFID Systems
View Sample PDF
Author(s): Behzad Malek (Ryerson University, Canada)and Ali Miri (Ryerson University, Canada)
Copyright: 2014
Pages: 23
Source title: Crisis Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-4707-7.ch085

Purchase

View Identification and Authentication for RFID Systems on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.

Related Content

Christopher Nyakotyo, Pedzisai Goronga. © 2024. 18 pages.
Colleen Halupa. © 2024. 23 pages.
Stefan Handke. © 2024. 14 pages.
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla. © 2024. 19 pages.
Ahmad Kayaly. © 2024. 20 pages.
Elizabeth Stroble. © 2024. 15 pages.
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane. © 2024. 20 pages.
Body Bottom