RFID Security in IoT
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 285 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project | Computer Engineering | India | Volume 11 Issue 7, July 2022 | Popularity: 4.7 / 10


     

RFID Security in IoT

Dr. Gayathri Rajakumaran, Shola Usharani


Abstract: The Internet of things involves high risk in terms of security and privacy act because of its usage through many public networks. Many IoT applications using RFID from home to warehouse. Smart Ration Card is one of the applications used in order to prevent corruption and malpractices in the distributed ration system. RFID tag is used for providing unique identification for ration card. Once the card is identified the authentication process is done by Generating the OTP. After the authentication is done the database is updated to reduce human efforts. This RFID card may be affected by security threat as there is no security module integrated with RFID cards. In this paper various security threats are identified to provide security of the RFID based system. Integrity and data protection are the main concern for security and to prevent it we can take consider measures. Cryptography is one of the techniques that confirms secure transaction between sender and receiver for better security. To protect Smart Ration Card using RFID in IoT used ECC which is cheap, secure and fast. ECC is integrated with RFID system in order to protect the data from malicious attack


Keywords: IoT, RFID, Raspberry Pi, DOS, ECC


Edition: Volume 11 Issue 7, July 2022


Pages: 1420 - 1424


DOI: https://www.doi.org/10.21275/SR22713162252



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Dr. Gayathri Rajakumaran, Shola Usharani, "RFID Security in IoT", International Journal of Science and Research (IJSR), Volume 11 Issue 7, July 2022, pp. 1420-1424, https://www.ijsr.net/getabstract.php?paperid=SR22713162252, DOI: https://www.doi.org/10.21275/SR22713162252

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Engineering, India, Volume 11 Issue 9, September 2022

Pages: 443 - 444

Prediction of the Network Attacks by Finding the Best Accuracy using Supervised Machine Learning Algorithm

A. Sharfudeen

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Engineering, India, Volume 13 Issue 6, June 2024

Pages: 838 - 842

Enhancing Privacy and Efficiency in IoT through Federated Learning

Nazeer Shaik

Share this Article

Downloads: 3

Informative Article, Computer Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1326 - 1327

Auto Climate Monitoring System

Mohak Rastogi, Akash Gangwar, Abhishek Yadav

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Engineering, India, Volume 10 Issue 11, November 2021

Pages: 420 - 425

Smart Parking with Prediction of Available Spots: A Proposed Approach

Fenil Nakrani

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Engineering, India, Volume 11 Issue 7, July 2022

Pages: 85 - 88

The Foster: Humanoid Robot

Tejal V. Kasture

Share this Article
Top