A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers

Loading...
Thumbnail Image
Date
2012-01
Authors
Tan, Aik Theng
Journal Title
Journal ISSN
Volume Title
Publisher
Universiti Sains Malaysia
Abstract
There is a limitation for a RFID reader to read thousands of data provided by RFID tags in a second. Hence, multiple RFID readers configuration is required to help resolving this scenario. In real world applications of RFID system, there will be a lot of configurations for RFID reader and RFID tag such as multiple RFID tag communicate with a RFID reader or vice versa, multiple RFID tag communicate with multiple RFID reader and multiple RFID readers communicate with a single RFID tag. In order to ensure that existing network protocols which developed by previous researchers for communication in RFID system can support in whatever types of RFID tag and RFID reader configuration, a reliability and specific test through these existing network protocols have been introduced in this research work. Several types of RFID reader and RFID tag configuration will be used for verifying each of existing network protocols ability for detecting a single RFID tag existence in multiple RFID readers field. Based on our analysis, it is discovered that there are two types of network protocol used for generating multiple RFID tag coexistence proof. They are named as tags dependent on each other’s output network protocol and tags independent on each other’s output network protocol which used to generate hash value and message authentication code. Via this research work, these two types of network protocol are applied for authenticating a single RFID tag existence in multiple RFID readers field in order to determine their ability to be used for authentication in RFID system. Typically, a single RFID tag authenticated by multiple RFID reader configuration can be used in a multi-purpose RFID infrastructure where a single RFID tag is interrogated by various readers for different purposes and verification of race communication in between multiple RFID reader existence. Apart from that, an application of asymmetric cryptography such as elliptic curve cryptography to replace symmetric cryptography for performing data encryption on RFID tag and RFID reader helping to provide high security protecting to resist adversaries attack as well as maintaining small length of secret key application on RFID tag and RFID reader.
Description
Keywords
RFID protocol for detecting the existence of , a single RFID tag by two RFID readers
Citation