Keerti Srivastava1*, Amit K. Awasthi2 and R. C. Mittal3
Author Address :
1Central Institute of Plastic Engineering and Technology, Lucknow, India.
2Gautam Budh University, Greater Noida, India.
3IIT Roorkee, Roorkee, India.
This research paper focuses on structuring an RFID Protocol in which the answer to the question ``Am I really the person who is accessing the resources" will be solved by implementing biometric techniques with RFID Protocol. Therefore, an effort will make to construct RFID protocol using biometric impression of RFID tag holder for resisting the protocol against illegitimate access.
Illegitimate Access, RFID tag, biometric template.
Article Info :
Received : December 24, 2017; Accepted : January 21, 2018.