ABSTRACT

The authentication protocols for radio-frequency identification (RFID) systems are vital security procedures aimed to protect user privacy and remove other security vulnerabilities. Various authentication protocols have been developed to enable reliable authentication of RFID system components and to provide object identification. The major challenge in the design of these protocols is to achieve the balance between required security level and the limited computational capabilities of RFID devices.