Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/460705
Title: | Increasing security for rfid system using low power nfsr with irregular clock pulse |
Researcher: | Suresh T |
Guide(s): | Ramakrishnan M |
Keywords: | Radio Frequency Identification Nonlinear Feedback Shift Register Irregular Clock |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Radio Frequency Identification (RFID) System based applications newlinehave increased worldwide. Here the target is scanned without physical contact newlineand line of sight is not required. The wireless communication plays an newlineimportant role in the data transmission in the RFID communication. The data newlinetransmission in wireless communication is less secure. More number of newlinecryptographic algorithms are available to secure the data transmission in newlinewireless communication. Strong cryptographic algorithms like Advanced newlineEncryption Standard (AES) and Data Encryption Standard (DES) are available newlineand have number of cycles to encrypt the plain text. It requires more memory newlinespace and power to encrypt the data. This type of encryption algorithm is more newlinesuitable for active tag. newlineThe RFID passive tags are operated without battery, hence the light newlineweight protocol is suitable for passive tag. Most of the RFID system uses the newlineElectronic Product Code Class 1 Generation 2 (EPC C1G2) standard protocol, newlinethis is light weight protocol like simple XOR operation and concatenated newlineprocess is required. In the existing EPC C1G2 provides the one-way newlineauthentication protocol. One-way authentication protocol supports only a tag newlinethat verifies the reader and reader cannot verify the tag. The security level of newlinethis one-way authentication scheme is low. The security of tag and reader newlinecommunication can be increased by authenticating each other. In this case tag newlineverifies and confirms the authenticate reader and reader verifies and confirms newlinethe authenticate tag. The Mutual authentication techniques improve the security newlinelevel of tag-reader communication. Most of the RFID tag attacks are restricted newlinein the mutual authentication techniques. newline |
Pagination: | xvi,111p. |
URI: | http://hdl.handle.net/10603/460705 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 42.54 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 5.78 MB | Adobe PDF | View/Open | |
03_content.pdf | 24.79 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 17.21 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 482.5 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 604.49 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 400.6 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 2.04 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 2.05 MB | Adobe PDF | View/Open | |
10_annexure.pdf | 126.61 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 75.72 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: