
Concealing RFID: Authentication using Cloud
Author(s) -
Prof. Suvarna Aranjo,
Jay Panchal,
Bhavna Sarkar,
Atharva Bagwe
Publication year - 2022
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2022.40977
Subject(s) - radio frequency identification , computer science , computer security , identification (biology) , authentication (law) , cloud computing , process (computing) , internet of things , wireless , popularity , smart objects , identity (music) , biometrics , telecommunications , psychology , social psychology , botany , physics , acoustics , biology , operating system
RFID (Radio Frequency Identification) has gone from unknown to well-known in recent years as it is frequently employed for security purposes. Because everyone's primary goal is to be safe, our project is heavily focused on security. Because everyone is concerned about data being leaked or misused, this project will ensure that security is increased and that RFID can be used safely. It is a wireless communication technique that allows computers to read the identity of electronic tags from a distance using computers. There are numerous advantages to RFID, but it also has certain disadvantages. This article use card/tag detection to ensure that RFID users are permitted. Radio frequency is the technology that allows smart labels to be attached to objects. As a result, even physical objects can take part in the computing process. It is gaining popularity as a result of its technological advancements and capacity to overcome line-of-sight issues. RFID has become commonplace in smart applications or IoT use cases such as smart education, smart housing, smart healthcare, and smart cities, to name a few. IoT, RFID, and a slew of other technologies and standards make it possible to connect the digital and physical worlds. When RFID technology is used to uniquely identify linked devices and things, it is critical to understand its utility in the authentication process as well as the security concerns that may arise. In wireless communication, RFID tags and RFID readers are used. Keywords: Radio frequency Identification ,smart IoT applications, Internet of Things, cloud-based remote RFID authentication