A Gen2-Based RFID Authentication Protocol
for Security and Privacy
Abstract:
EPCglobal Class-1 Generation-2
specification (Gen2 in brief) has been approved as ISO18000-6C for global use,
but the identity of tag (TID) is transmitted in plaintext which makes the tag
traceable and clonable. Several solutions have been proposed based on
traditional encryption methods, such as symmetric or asymmetric ciphers, but
they are not suitable for low-cost RFID tags. Recently, some lightweight
authentication protocols conforming to Gen2 have been proposed. However, the
message flow of these protocols is different from Gen2. Existing readers may
fail to read new tags.
Algorithm / Technique
used:
Candidate
Set Finding Algorithm.
Algorithm Description:
We present a candidate set finding algorithm
that will produce a ck0 close enough to be accepted. After singulation
processes, the back-end database generates ck0 and lets the reader forward it
to the tag. Consider the target CRC value ck as a codeword in the code space of
2 power16, where t is the acceptable range of the tag. We want to find a
suitable codeword that falls into this range. If the tag does not respond,
which means ckj is outside the range, we then eliminate some entries in the
database. Note that a and b changes every round and ckj must be recomputed. The
following is a pseudo code of the candidate set finding algorithm for the
back-end database:
Existing
System:
Radio
Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical
barcodes, another common automatic identification system, have been a familiar
packaging feature on consumer items for years. Due to advances in silicon manufacturing
technology, RFID costs have dropped significantly. In the near future, low-cost
RFID “electronic product codes” or “smart-labels” may be a practical
replacement for optical barcodes on consumer items. Unfortunately, the
universal deployment of RFID devices in consumer items may expose new security
and privacy risks not present in closed manufacturing environments. This
presents an introduction to RFID technology, identifies several potential
threats to security and privacy, and offers several practical proposals for
efficient security mechanisms. We offer several policy suggestions and discuss
various open questions and areas of research.
Proposed System:
In this project, we propose a novel
authentication protocol based on Gen2, called Gen2+, for low-cost RFID tags.
Our protocol follows every message flow in Gen2 to provide backward
compatibility. Gen2+ is a multiple round protocol using shared pseudonyms and
Cyclic Redundancy Check (CRC) to achieve reader-to-tag authentication.
Conversely, Gen2+ uses the memory read command defined in Gen2 to achieve
tag-to-reader authentication. We show that Gen2+ is more secure under tracing
and cloning attacks.
Hardware Requirements:
•
System : Pentium Iv
2.4 Ghz
•
Hard Disk : 40 Gb
•
Floppy Drive : 1.44 Mb
•
Monitor : 15 Vga
Colour
•
Mouse : Logitech.
•
Ram : 256 Mb
Software Requirements:
•
Operating system :- Windows XP Professional
•
Front End :
- .Net 2005.
•
Coding Language :- Visual C# .Net
•
Back-End :
- Sql Server 2000.
No comments:
Post a Comment