Reference Hub1
Identification and Authentication for RFID Systems

Identification and Authentication for RFID Systems

Behzad Malek, Ali Miri
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch085
Cite Chapter Cite Chapter

MLA

Malek, Behzad, and Ali Miri. "Identification and Authentication for RFID Systems." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 1682-1704. https://doi.org/10.4018/978-1-4666-4707-7.ch085

APA

Malek, B. & Miri, A. (2014). Identification and Authentication for RFID Systems. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 1682-1704). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch085

Chicago

Malek, Behzad, and Ali Miri. "Identification and Authentication for RFID Systems." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1682-1704. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch085

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.