Gen2-Based RFID Authentication Protocol for Security and Privacy
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
17-09-2009, 02:48 AM


Gen2-Based RFID Authentication Protocol for Security and Privacy
Abstract

EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags. Recently, some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags. In this paper, we propose a novel authentication protocol based on Gen2, called Gen2^ {+}, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2^ {+} is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader-to-tag authentication. Conversely, Gen2^ {+} uses the memory read command defined in Gen2 to achieve tag-to-reader authentication. We show that Gen2^ {+} is more secure under tracing and cloning attacks.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
sathya1985
Active In SP
**

Posts: 2
Joined: Mar 2010
#2
12-03-2010, 04:29 PM

Need UML diagrams
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#3
08-10-2010, 10:41 AM


.ppt   A Gen-2 Based RFID Authentication Protocol.ppt (Size: 41 KB / Downloads: 175)
A Gen-2 Based RFID Authentication Protocol


INTRODUCTION

EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable.
Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags.
Some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these protocols is different from Gen2. Existing readers may fail to read new tags.
We propose a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to-tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.

Objective



A main objective of this project and implimentation is : a novel authentication protocol based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility.
Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve reader to- tag authentication.
Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
Gen2þ is more secure under tracing and cloning attacks

Existing System


The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.


Existing System

The exposition of tag identification in this protocol may violate user’s privacy. Any revealed TID can be easily tracked and cloned. Our goal is to enhance the security of the Gen2 protocol and remain lightweight at the same time.
The specification of Gen2, one can see that optimal security is protected by the access password. In other words, the time complexity of exhaustive search .The scheme is safer when the password is longer.
To overcome the problem and provide lightweight solutions for Gen2 specification at the same time.

Proposed System


Our main idea is to randomize each session and provide mutual authentication between legitimate readers and tags, like other pseudonym-based approaches .
In order to be compatible with the original Gen2 specification, we proposed a new protocol called Gen2þ,using only PRNG and CRC-16 functions for authentication.
We assume that each tag shares an l-word-long random string, called keypool, with the back-end database. This string is randomly generated by the back-end server and is written into the tag’s user-bank memory before deployment.
The string is considered as a keypool where we can randomly draw keys. A threshold value is set in each tag to tolerate error bits of the received value and to boost the reading speed.
Need an extra circuitry element in the tag to calculate the Hamming distance of two 16-bit numbers. Hamming distance calculators are often seen in error-correcting hardwares,and the new tag can be implemented easily.
Reply
mkp
Active In SP
**

Posts: 4
Joined: Oct 2010
#4
13-10-2010, 11:42 PM

RFID can be effectively used to identify and track objects and animals by implanting a tag in its body. This method can be effectively used for tracking our pets. I really wonder whether there are any side effects because the tracking is done using radio waves. Now these chips are used in humans. But nowadays nobody is prepared to wear them because they are known to cause a lot of diseases like cancer especially subcutaneous sarcomas. Another serious issue is MRI incompatibility.
Reply
Rockzzzzz
Active In SP
**

Posts: 1
Joined: May 2011
#5
17-05-2011, 11:05 AM

Excuse me Friends,

I need UML diagram for A Gen2 - Based RFID Authentication Protocol
for Security and Privacy.


please.......
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  border security using wireless integrated network sensors ppt jaseelati 0 215 05-02-2015, 01:54 PM
Last Post: jaseelati
  Image Authentication Techniques computer science crazy 4 4,304 23-08-2013, 09:29 AM
Last Post: study tips
  Midnight Security Light Circuit Schematic study tips 0 336 15-05-2013, 04:06 PM
Last Post: study tips
  SMART GRID SECURITY TECHNOLOGY ABSTRACT study tips 1 652 07-03-2013, 02:58 PM
Last Post: study tips
  Ipv6 - The Next Generation Protocol computer science crazy 3 2,567 04-03-2013, 12:33 PM
Last Post: study tips
  ZIGBEE PROTOCOL PPT project girl 0 380 23-01-2013, 12:57 PM
Last Post: project girl
  Security and Privacy in Sensor Nets PPT project girl 0 356 23-01-2013, 12:07 PM
Last Post: project girl
  Emerging Security Threats for Mobile Platforms pdf project girl 0 341 19-12-2012, 05:44 PM
Last Post: project girl
  The Solution of Hybrid Electric Vehicle Information System by Modbus Protocol pdf project girl 0 309 15-12-2012, 01:58 PM
Last Post: project girl
  RFID Based Attendance System seminar surveyer 11 10,306 30-11-2012, 11:28 AM
Last Post: seminar tips