Güvenli bir RFID protokolünün gerçeklenmesi

Translated title of the contribution: Implementation of a secure RFID protocol

Subutay Giray Baskir, Berna Ors

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

RFID is an ever prevalent becoming technology. This increase of use brings its disadvantage, efforts to breach its security. As a result, generating cryptology algorithms is a solution that should be worked upon. In this project an implementation of an RFID authentication protocol is described. In the implementation, in order to simulate tag and reader, suitable electronic cards are equipped. Because of the fact that the microcontrollers' memory sizes and processing capability are very important, the selection of microcontrollers which are capable for this implementation is made with considering these parameters. After the preparing section of tag and reader, these steps are executed consecutively; communication between electronic cards is built individually, AES functions are executed then communication between cards is built. After all, the execution of authentication protocol between tag and reader is aimed.

Translated title of the contributionImplementation of a secure RFID protocol
Original languageTurkish
Title of host publication2013 21st Signal Processing and Communications Applications Conference, SIU 2013
DOIs
Publication statusPublished - 2013
Event2013 21st Signal Processing and Communications Applications Conference, SIU 2013 - Haspolat, Turkey
Duration: 24 Apr 201326 Apr 2013

Publication series

Name2013 21st Signal Processing and Communications Applications Conference, SIU 2013

Conference

Conference2013 21st Signal Processing and Communications Applications Conference, SIU 2013
Country/TerritoryTurkey
CityHaspolat
Period24/04/1326/04/13

Fingerprint

Dive into the research topics of 'Implementation of a secure RFID protocol'. Together they form a unique fingerprint.

Cite this