Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery ...Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.In this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system.The proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication process.Furthermore,the proposed authentication scheme is mathematically modeled and validated using extensive simulation.The simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers.展开更多
基金This material is based on the project supported by the National Science Foundation,CISE/CNS Trustworthy Computing program,under grant No.CNS-1053286.
文摘Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.In this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system.The proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication process.Furthermore,the proposed authentication scheme is mathematically modeled and validated using extensive simulation.The simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers.