This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
Physical communication channels in wireless technology are inherently insecure. As
a wire only has two ends, the wired communication technology has a means of
supporting integrity of communication, whereas in wireless communication
dedicated technology is needed—even to control a basic point-to-point connection.
Hybr idity and Connect ivity br ing act ivit ies and people together, rather than
isolate objects and separate functions. These qualities also treat people and nature
as symbiot ic—as well as buildings and landscape—rather than opposit ional.
Porosity preserves the integr ity of that which is brought together while allowing
mutual access through permeable membranes, rather than the modernist at tempt
to dismantle boundaries or postmodernist fortiication.