Protocol to Authenticate the Objects Attached with Multiple RFID Tags

  • Subhasish Dhal
  • Indranil Sengupta
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 298)


Use of multiple Radio Frequency Identification (RFID) tags in an object increases the detection rate in comparison to the single tagged object. Since, more than one tag is involved in the same object; the security such as authentication scheme needs to be revised. The authentication schemes that have been proposed so far are only for single tagged object. Modification of these schemes may be applicable to multi-tag environment. However, the advantage of having more resource (tags) can be utilized to enhance the security. We have used this advantage and proposed an authentication scheme which is not only applicable to multi tag environment but also enhance the security.


Multi tag RFID Pair-wise secret Authentication 


  1. 1.
    Bolotnyy L, Robins G (2007) Multi-tag RFID systems. J Internet Protoco Technol (IJIPT) 2(3/4):218–231. Special issue on RFID: technologies, applications, and trendsGoogle Scholar
  2. 2.
    Weis SA, Sarma S, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the first security in pervasive computing, LNCS-2802. Springer, New YorkGoogle Scholar
  3. 3.
    Tan C, Sheng B, Li Q (2007) Serverless search and authentication protocols for RFID. In: Proceedings of the fifth annual IEEE international conference on pervasive computing and communication (PerCom)Google Scholar
  4. 4.
    Tsudik G (2007) A family of dunces: trivial RFID identification and authentication protocols. In: Proceedings of PETGoogle Scholar
  5. 5.
    Burmester M, Van Le T, de Medeiros B (2006) Provably secure ubiquitous systems: universally composable RFID authentication protocols. In: Proceedings of SECURECOMMGoogle Scholar
  6. 6.
    Conti M, Di Pietro R, Vincenzo Mancini L (2007) RIPP-FS: an RFID identification, privacy preserving protocol with forward secrecy. In: Proceedings of PerCom’07, pp 229–234Google Scholar
  7. 7.
    Zhang Y, Li D, Zhu Z (2008) An efficient RFID tag-reader mutual authentication scheme. In: Proceedings of WiCOM’08, pp 1–4Google Scholar
  8. 8.
    Lei H, Yong G, Zeng-yu C, Na-na L (2009) An improved lightweight RFID protocol using substring. In: Proceedings of the 5th international conference on Wireless communications, networking and mobile computing, pp 3717–3720Google Scholar
  9. 9.
    Khalili A, Katz J, Arbaugh WA (2003) Toward secure key distribution in truly ad-hoc networks. In: Proceedings of symposium on applications and the internet workshops (SAINT 2003 Workshops), Saint-W, p 342Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia

Personalised recommendations