Network Security Protocol with Rfid System

Only available on StudyMode
  • Topic: RFID, Radio-frequency identification, Wireless
  • Pages : 6 (1385 words )
  • Download(s) : 299
  • Published : August 29, 2010
Open Document
Text Preview


Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system.

This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique is widely applicable in network security field but still we are suffering from hacking and unauthorized access. Hence we have introduced a new idea for being applicable in security field that is RFID technique. Here we will describe its various applications in various fields and how it can be implemented in network security. The security and privacy issues of RFID and their solutions will also be discussed. And the future possible ideas for the new technologies like PPTN (point to point tunneling protocol) and VPN (virtual private network) with their applications in network security will also be discussed.


In present scenario the no. of subscriber with wireless access of internet through laptop, personal digital assistants (PDA’s), cellular phones, pagers and other wireless devices are increasing rapidly. In 1998, 1.2 million people had wireless web access. Hence wireless communication is one of the famous methods of interchanging information. Network is a group f systems or entities which are connected by a communication medium either it may be wired or wireless and this whole environment are called networking.

(1) Data confidentiality

(2) Data integrity

(3) Security

(4) Data identification

(5) Authorized access

In this paper we will discuss one ancient method for achieving secure communication that is known as cryptography in which this can be done with the help of two operations called encryption & decryption. It is very secure way of communication in a network but still we are suffering from hacking or unauthorized access hence here we will introduce another concept which may be applicable for network security due to its various enomourous application in secured communication. Here we will just discuss the justification that RFID technique may be applicable in security purposes. RFID systems needs two components that are

RFID transmitter (used to emit radio freq. signal)

RFID tags (works as a receiver)

There are mainly two techniques which we will describe here, those are as follows:


(2)RFID technique


Before dealing with cryptography we need to explain the concept of cryptology. The basic classification or stages of cryptology are given as:


CRYPTOLOGY: It is made up from two GREEK words that are “KRYPTOS” which means hidden and “LOGOS” mean words hence we can say cryptology is an ancient art of hiding words for data security.

CRYPTOGRAPHY: It is the branch of cryptology in which we studied the design of techniques of ensuring authorization and secrecy of information. So data can be secured from unauthorized access.


RFID technique...
tracking img