A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
Loading...
Date
2012-01
Authors
Tan, Aik Theng
Journal Title
Journal ISSN
Volume Title
Publisher
Universiti Sains Malaysia
Abstract
There is a limitation for a RFID reader to read thousands of data provided by RFID tags in
a second. Hence, multiple RFID readers configuration is required to help resolving this scenario.
In real world applications of RFID system, there will be a lot of configurations for RFID
reader and RFID tag such as multiple RFID tag communicate with a RFID reader or vice versa,
multiple RFID tag communicate with multiple RFID reader and multiple RFID readers communicate
with a single RFID tag. In order to ensure that existing network protocols which
developed by previous researchers for communication in RFID system can support in whatever
types of RFID tag and RFID reader configuration, a reliability and specific test through these
existing network protocols have been introduced in this research work. Several types of RFID
reader and RFID tag configuration will be used for verifying each of existing network protocols
ability for detecting a single RFID tag existence in multiple RFID readers field. Based on
our analysis, it is discovered that there are two types of network protocol used for generating
multiple RFID tag coexistence proof. They are named as tags dependent on each other’s output
network protocol and tags independent on each other’s output network protocol which used
to generate hash value and message authentication code. Via this research work, these two
types of network protocol are applied for authenticating a single RFID tag existence in multiple
RFID readers field in order to determine their ability to be used for authentication in RFID
system. Typically, a single RFID tag authenticated by multiple RFID reader configuration can
be used in a multi-purpose RFID infrastructure where a single RFID tag is interrogated by various
readers for different purposes and verification of race communication in between multiple
RFID reader existence. Apart from that, an application of asymmetric cryptography such as
elliptic curve cryptography to replace symmetric cryptography for performing data encryption
on RFID tag and RFID reader helping to provide high security protecting to resist adversaries
attack as well as maintaining small length of secret key application on RFID tag and RFID
reader.
Description
Keywords
RFID protocol for detecting the existence of , a single RFID tag by two RFID readers