Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Introduction to Cryptography with Coding Theory (2nd Edition)
Introduction to Cryptography with Coding Theory (2nd Edition)
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Hi-index | 0.00 |
Radio Frequency Identification (RFID) systems can be applied to various areas. A RFID system is composed of tag, reader and host computer. The reader has an antenna for transferring the energy and sending/receiving of data. Cables are used for communication between reader of RFID system and host computer. If a RFID system is implemented in the existing building or gate, the data communication line should be installed in the wall of building or inside of the wall, and this causes some problems. We suggest a solution to this problem, as ID data from tag is transferred to host computer by wireless communication in the reader. In addition, TCP/IP communication can be used for recognizing ID data in long distance.In this paper, we show a device that sends ID Data from reader to the receiver over wireless network using CC1020 chip and a device that sends ID data from the receiver to the host computer over internet network using W3100A chip. From this, the paper explains the system transferring ID data to the host computer over wireless and Internet network. There are main circuits for each device and block diagram for programming shown in the picture. The system contains a security agent for security managements and services. In addition, the actual data waveform and experimental device are shown in the picture as well as the result of identification in the host computer.