A PROPOSED RFID SECURITY PROTOCOL BASED ON TWO STAGE AUTHENTICATION
Radio frequency identification (RFID) system can transform items into essential innovations in distinguishing these remotely. In many cases, the use of RFID tag may prompt new threats to the security and assurance of individuals holding RFID tag. Threats are of different kinds of attacks like man in the middle attack, replay attack, Denial of service, spoofing attack. These threats lead to many problems like impersonation of tags, information leakage, tracing of location and many more. In this paper, we propose a protocol to stop the man in the middle attack by combining two different methods together, namely, hash lock function and station to station key arrangement.