amazon

Sunday, August 16, 2015

A Gen2-Based RFID Authentication Protocol for Security and Privacy

A Gen2-Based RFID Authentication Protocol
for Security and Privacy

Abstract:

EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags. Recently, some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags.

















Algorithm / Technique used:

 Candidate Set Finding Algorithm.


Algorithm Description:
 We present a candidate set finding algorithm that will produce a ck0 close enough to be accepted. After singulation processes, the back-end database generates ck0 and lets the reader forward it to the tag. Consider the target CRC value ck as a codeword in the code space of 2 power16, where t is the acceptable range of the tag. We want to find a suitable codeword that falls into this range. If the tag does not respond, which means ckj is outside the range, we then eliminate some entries in the database. Note that a and b changes every round and ckj must be recomputed. The following is a pseudo code of the candidate set finding algorithm for the back-end database:















Existing System:

Radio Frequency Identification (RFID) systems are a common and useful tool in manufacturing, supply chain management and retail inventory control. Optical barcodes, another common automatic identification system, have been a familiar packaging feature on consumer items for years. Due to advances in silicon manufacturing technology, RFID costs have dropped significantly. In the near future, low-cost RFID “electronic product codes” or “smart-labels” may be a practical replacement for optical barcodes on consumer items. Unfortunately, the universal deployment of RFID devices in consumer items may expose new security and privacy risks not present in closed manufacturing environments. This presents an introduction to RFID technology, identifies several potential threats to security and privacy, and offers several practical proposals for efficient security mechanisms. We offer several policy suggestions and discuss various open questions and areas of research.







Proposed System:

In this project, we propose a novel authentication protocol based on Gen2, called Gen2+, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2+ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader-to-tag authentication. Conversely, Gen2+ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication. We show that Gen2+ is more secure under tracing and cloning attacks.






















Hardware Requirements:

         System                 : Pentium Iv 2.4 Ghz
         Hard Disk             : 40 Gb
         Floppy Drive       : 1.44 Mb
         Monitor                : 15 Vga Colour
         Mouse                  : Logitech.
         Ram                     : 256 Mb




Software Requirements:

         Operating system           :- Windows XP Professional
         Front End             : - .Net 2005.
         Coding Language :- Visual C# .Net
         Back-End             : - Sql Server 2000.



No comments:

Post a Comment