Gen2-Based RFID Authentication Protocol for Security and Privacy
#1

Gen2-Based RFID Authentication Protocol for Security and Privacy
Abstract

EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags. Recently, some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags. In this paper, we propose a novel authentication protocol based on Gen2, called Gen2^ {+}, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2^ {+} is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader-to-tag authentication. Conversely, Gen2^ {+} uses the memory read command defined in Gen2 to achieve tag-to-reader authentication. We show that Gen2^ {+} is more secure under tracing and cloning attacks.
Reply
#2
Need UML diagrams
Reply
#3
Thumbs Up 
[attachment=5382]
A Gen-2 Based RFID Authentication Protocol


INTRODUCTION

EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable.
Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags.
Some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags.
We propose a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to-tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.

Objective



A main objective of this project is : a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility.
Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to- tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
Gen2þ is more secure under tracing and cloning attacks

Existing System


The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.


Existing System

The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.

Proposed System


Our main idea is to randomize each session and provide mutual authentication between legitimate readers and tags, like other pseudonym-based approaches .
In order to be compatible with the original Gen2 specification, we proposed a new protocol called Gen2þ,using only PRNG and CRC-16 functions for authentication.
We assume that each tag shares an l-word-long random string, called keypool, with the back-end database. This string is randomly generated by the back-end server and is written into the tag’s user-bank memory before deployment.
The string is considered as a keypool where we can randomly draw keys. A threshold value is set in each tag to tolerate error bits of the received value and to boost the reading speed.
Need an extra circuitry element in the tag to calculate the Hamming distance of two 16-bit numbers. Hamming distance calculators are often seen in error-correcting hardwares,and the new tag can be implemented easily.
Reply
#4
RFID can be effectively used to identify and track objects and animals by implanting a tag in its body. This method can be effectively used for tracking our pets. I really wonder whether there are any side effects because the tracking is done using radio waves. Now these chips are used in humans. But nowadays nobody is prepared to wear them because they are known to cause a lot of diseases like cancer especially subcutaneous sarcomas. Another serious issue is MRI incompatibility.
Reply
#5

Excuse me Friends,

I need UML diagram for A Gen2 - Based RFID Authentication Protocol
for Security and Privacy.


please.......
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: rfid technology for security, project on rfid based security systemhowroom, avl rfid, authentication computer security, m privacy for collobaritve datapublishing, network security and cryptography in internet protocol with rfid system, protocol rfid,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  RFID Based Attendance System seminar surveyer 6 9,066 13-10-2013, 09:49 PM
Last Post: Guest
  EMBEDDED SECURITY SYSTEM IN AUTOMATED TELLER MACHINE seminar class 2 2,685 30-09-2013, 10:56 AM
Last Post: computer topic
  GSM Security And Encryption computer science crazy 2 2,809 22-03-2013, 11:06 AM
Last Post: computer topic
  Wireless Application Protocol computer science crazy 4 5,602 29-11-2012, 02:28 PM
Last Post: seminar details
  Image Authentication Techniques computer science crazy 2 4,197 15-11-2012, 12:24 PM
Last Post: seminar details
  A microprocessor-based generator of synchronizing signal and test signal for colour T Electrical Fan 1 4,958 07-11-2012, 11:38 PM
Last Post: Guest
  DTMF Based Interfacing and Control of Induction Motor using TRIAC computer girl 0 1,823 07-06-2012, 11:02 AM
Last Post: computer girl
  Internet Protocol Television (IPTV) computer science crazy 13 8,701 14-07-2011, 10:40 AM
Last Post: smart paper boy
Rainbow RFID SYSTEMS seminar projects crazy 4 3,554 01-05-2011, 12:01 PM
Last Post: YashaswiniV
  Security and Privacy Support for Data-Centric Sensor Networks computer science crazy 1 2,627 19-03-2011, 09:47 AM
Last Post: seminar class

Forum Jump: