Abstract:
Radio-frequency identi cation (RFID) uses electromagnetic elds to automatically iden-
tify and track tags attached to objects. The tags contain electronically stored informa-
tion. Unlike a barcode, the tag need not be within the line of sight of the reader, so it
may be embedded in the tracked object. RFID is one method for Automatic Identi ca-
tion and Data Capture (AIDC). RFID tags are used in many industries, for example, an
RFID tag attached to an automobile during production can be used to track its progress
through the assembly line; RFID-tagged pharmaceuticals can be tracked through ware-
houses; and implanting RFID microchips in livestock and pets allows positive identi ca-
tion of animals. In this we paper we review some of the RFID authentication protocols
and compare their strengths/weaknesses and propose an authentication protocol that
we have thought of provide a comparative analysis of our protocol.