International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 69 - Number 27 |
Year of Publication: 2013 |
Authors: Harshad Panwar, Umesh Kumar Garg, Neetu Sharma |
10.5120/12143-8435 |
Harshad Panwar, Umesh Kumar Garg, Neetu Sharma . Time Stamp with Authentication Protocol for Securing Tag Reader Communication. International Journal of Computer Applications. 69, 27 ( May 2013), 15-17. DOI=10.5120/12143-8435
RFID is evolving as a major technology. Since 1940s its use in different domains shows its gaining importance also it's a better alternative to barcode as no line of sight is required. Here we have showed the use of time stamp that validates the authenticity of the sender to be legal or authorized. So, copying of tag is restricted by a large [3]. The proposed plan is to prevent the RFID system form attack by foreign agent. At the time of connection initiation when the two entities are authenticated and secondly to assure that the connection is not breached. Here, hash function and time stamp are used in conjunction with message [6]. This is a scalable and efficient mechanism to check eavesdropper illegal entry into the communication channel.