Abstract:
We implement and test four RFID security : Strong Private Authentication Protocol, Mutual-Authentication Protocol, Dimitriou's Protocol, and Advanced Semi-Randomized Control, by emulating the RFID system. Then, analyze the results to provide an evaluation of each . RFID tags are very limited in terms of power, and cannot perform complex . Two types of analysis are thus : security and performance. The security examines the following security issues: prevention, man-in-the-middle attack , forward secrecy, tag anonymity, user data , replay attack prevention, and resistance. In the performance,we analyze the following: computation , storage requirements, and communication . As a result, enhancements are added to protocols to strengthen their security and eliminate their weaknesses. ©2008 IEEE.