Comparison and Feasibility of Various RFID Authentication Methods Using ECC
AbstractRadio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use. View Full-Text
Share & Cite This Article
Alexander, P., Jr.; Baashirah, R.; Abuzneid, A. Comparison and Feasibility of Various RFID Authentication Methods Using ECC. Sensors 2018, 18, 2902.
Alexander P, Jr, Baashirah R, Abuzneid A. Comparison and Feasibility of Various RFID Authentication Methods Using ECC. Sensors. 2018; 18(9):2902.Chicago/Turabian Style
Alexander, Pagán, Jr.; Baashirah, Rania; Abuzneid, Abdelshakour. 2018. "Comparison and Feasibility of Various RFID Authentication Methods Using ECC." Sensors 18, no. 9: 2902.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.