Authentication has an important part in many RFID applications for providing security and privacy. The use of billions of tags worldwide would make computing vulnerable to security threats. Authentication has a significant part in many RFID applications for providing security and privacy. Security experts have been working on creation of a sound authentication mechanism for RFID applications. This paper investigates the possible privacy and security threats to RFID systems, and analyses some of previously proposed RFID protocols. RFID tags are small, wireless devices that help to identify objects and people. However the RFID authentication protocol between RF tags and RF readers have been brought about a range of privacy problems like security of the tags, tracking, eavesdropping, and so on. Many researchers have spotlighted and proposed the solution of these problems; however still no solid solution has been provided for problems, such as place privacy, mutual authentication. The paper also analyses different categories of RFID product authentication approaches.
Keywords- RFID, authentication, security, RF tags.
In recent years, automatic identification procedures (Auto ID) have become very popular in many service industries, like purchasing and distribution logistics and many more. Radio Frequency identification (RFID) is a technology for tagging using radio waves. RFID system consists of two main components tags and readers. Tags are small radio transponders; they contain the identification information of objects to which they are attached. Readers query these tags for the identifying information about the objects. Readers on the other hand have secure access to a back-end database. Therefore back-end server based RFID systems are dependent on a reliable connection between a reader and the backend server. However the authentication protocol should be provided even if the connection between the reader and the backend server was not established. The several studies have recently been made on authentication protocol for RFID tag and reader without backend server. An authentication protocol for the tag and readers has the problems such as anonymity of the tag , location, privacy eyes dropping and so on. Because RFID systems have no authentication and encryption mechanism in wireless environments it is vulnerable to attack. Privacy authentication for RFID tags is a big issue. Other solutions may have a problem regarding the efficiency since the verification procedure mainly consists in searching the right tag. Obviously, the tag cannot send in clear any information about its identifier. As a consequence, most of existing schemes necessitate testing all the keys in the database until a match is found. These schemes should moreover include randomness to ensure the privacy property, which can be done either by a value sent by the reader or by an update of the key
The paper involves reviews related work on requirements of the...