Identification and Authentication for RFID Systems

Identification and Authentication for RFID Systems

Behzad Malek (Ryerson University, Canada) and Ali Miri (Ryerson University, Canada)
DOI: 10.4018/978-1-4666-4707-7.ch085
OnDemand PDF Download:
No Current Special Offers


In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.
Chapter Preview

Identification In Rfid Systems

RFID systems communicate via electromagnetic waves and are categorized as radio systems. All radio systems operate in a narrow band to avoid signal interference with other radio systems. Therefore, available frequencies and transmitted power in every radio system, including RFID systems, are heavily regulated. These regulations and restrictions directly affect an RFID system in reading range, memory and the applicable standards. In this section, we briefly review each characteristic.

Complete Chapter List

Search this Book: