A Confidential Passive UHF Reader with Cryptographic Technique

Article Preview

Abstract:

In this paper, a passive UHF reader design with cryptographic technique SM2 is presented. By designing board compatibility of security module, RFID control module, RF module, communications interface, the passive UHF reader can both operate at common mode and security mode. This design constructs a suitable candidate for reliability, integrity, security of information transmission of RFID application in special field of internet of things.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1818-1821

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lajos Toth, Petra Dobrossy, RFID application in production process of an automotive industry supplier, INES 10th International Conference on Intelligent Engineering Systems, pp.45-48, (2006).

DOI: 10.1109/ines.2006.1689339

Google Scholar

[2] Pala Z, Inanc N, Smart parking applications using RFID technology, RFID Eurasia, pp.1-3, 5-6 Sept. (2007).

DOI: 10.1109/rfideurasia.2007.4368108

Google Scholar

[3] Carla R. Medeiros, Jorge R. Costa, and Carlos A. Fernandes , Passive UHF RFID tag for airport suitcase tracking and identification, IEEE Antenna and wireless propagation letters, Vol. 10, pp.123-126, (2011).

DOI: 10.1109/lawp.2011.2112326

Google Scholar

[4] Sangdo Park and Hongchul Lee, Self-recognition of vehicle position using UHF passive RFID tags, IEEE Transactions on industrial electronics, Vol. 60, No. 1, January (2013).

DOI: 10.1109/tie.2012.2185018

Google Scholar

[5] Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, Sanglu Lu, A novel security protocol against counting attack for UHF RFID systems, 2011 Fifth international conference on innovative mobile and internet services in ubiquitous computing, pp.100-105, (2011).

DOI: 10.1109/imis.2011.60

Google Scholar