08-10-2010, 10:41 AM
[attachment=5382]
INTRODUCTION
Objective
A main objective of this project is : a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility.
Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to- tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
Gen2þ is more secure under tracing and cloning attacks
Existing System
The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.
Existing System
The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.
Proposed System
Our main idea is to randomize each session and provide mutual authentication between legitimate readers and tags, like other pseudonym-based approaches .
In order to be compatible with the original Gen2 specification, we proposed a new protocol called Gen2þ,using only PRNG and CRC-16 functions for authentication.
We assume that each tag shares an l-word-long random string, called keypool, with the back-end database. This string is randomly generated by the back-end server and is written into the tag’s user-bank memory before deployment.
The string is considered as a keypool where we can randomly draw keys. A threshold value is set in each tag to tolerate error bits of the received value and to boost the reading speed.
Need an extra circuitry element in the tag to calculate the Hamming distance of two 16-bit numbers. Hamming distance calculators are often seen in error-correcting hardwares,and the new tag can be implemented easily.
A Gen-2 Based RFID Authentication Protocol
INTRODUCTION
EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable.
Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags.
Some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags.
We propose a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to-tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags.
Some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags.
We propose a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to-tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
Objective
A main objective of this project is : a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility.
Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to- tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
Gen2þ is more secure under tracing and cloning attacks
Existing System
The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.
Existing System
The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.
Proposed System
Our main idea is to randomize each session and provide mutual authentication between legitimate readers and tags, like other pseudonym-based approaches .
In order to be compatible with the original Gen2 specification, we proposed a new protocol called Gen2þ,using only PRNG and CRC-16 functions for authentication.
We assume that each tag shares an l-word-long random string, called keypool, with the back-end database. This string is randomly generated by the back-end server and is written into the tag’s user-bank memory before deployment.
The string is considered as a keypool where we can randomly draw keys. A threshold value is set in each tag to tolerate error bits of the received value and to boost the reading speed.
Need an extra circuitry element in the tag to calculate the Hamming distance of two 16-bit numbers. Hamming distance calculators are often seen in error-correcting hardwares,and the new tag can be implemented easily.