Gen2 based RFID authentication protocol for security and privacy
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 2
Joined: Mar 2010
12-03-2010, 03:37 PM

Need UMl diagrams and documentaion...

Thanks in advance...


Active In SP

Posts: 2
Joined: Jun 2010
21-06-2010, 07:39 AM

please send the uml diagram for a GEN2 based rfid authentication protocol
Active In SP

Posts: 2
Joined: Jun 2010
21-06-2010, 07:46 AM

please send the uml diagram for a gen2 based RFID authentication protocol

Attached Files
.doc   A Gen2 based RFID.doc (Size: 35 KB / Downloads: 116)
Active In SP

Posts: 2
Joined: Dec 2010
30-12-2010, 02:34 PM

pls anyone help me by providing the project and implimentation implementation of Gen-2 based RFID authentication protocol for security and privacy
Active In SP

Posts: 2
Joined: Dec 2010
30-12-2010, 02:44 PM

UML diagrams for RFID authentication protocol

Attached Files
.doc   SYSTEM DESIGN.doc (Size: 97.5 KB / Downloads: 60)
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
09-03-2011, 03:06 PM

.ppt   sunilppt.ppt (Size: 169.5 KB / Downloads: 110)
A Gen2-Based RFID Authentication Protocol for Security and Privacy

 Radio frequency identification
 A Gen2-Based RFID
 Authentication Protocol
 Advantages
Radio Frequency Identification
 “RFID” could be applied to systems in use for more than sixty years.
 RFID transponders, or tags, carry object identifying data. This data may include the
manufacturer, brand, model and a unique serial number.
 The first radio identification technology was the “Identify Friend or Foe” system used in Allied aircraft.
 RFID tags consist of a small microchip attached to an antennae or other coupling element.The tag communicates via radio frequencies (RF) with a transceiver, or tag reader.
A Gen2-Based RFID
 Gen-2 RFID tag is passive, meaning that it receives power supply from readers.
 Gen-2 RFID tag communicates with RFID readers in UHF band (800-960 MHz) and its communication range can be up to 2 ~ 10m.
 Gen-2 RFID tag supports on-chip Pseudo-Random Number Generator (PRNG) and Cyclic Redundancy Code (CRC) computation.
 Gen-2 RFID 's privacy protection mechanism is to make the tag permanently unusable once it receives the kill command with a valid 32-bit kill PIN
Authentication Protocol
Pseudo-random Number Generator:

 Gen-2 standard requires only 16-bit pseudo-random number, the security margin of a security protocol using such PRNG is usually bounded by 2-16.
 We suggest that Gen-2 standard should support 32-bit PRNG to take full advantage of 32-bit PIN currently supported by Gen-2 specification. Otherwise, XORing two halfs of a 32-bit PIN with the same 16-bit PIN.
CRC Checksum:
 In EPC global Class-2 Gen-2 specification, a 16-bit CRC checksum is used to detect error in transmitted data and the corresponding CRC polynomial of degree 16.
 If CRC is setup properly, we can expect that the probability of collision on n-bit CRC checksum.
 Accountability and Access Control: The approach enables easy accountability and access control because the backend server is in charge of looking up object information so it can decide who can get which information as well as some statistics.
 Reader-to-Tag Authentication: It is obvious that tag querying will happen most frequent. And because reader needs to contact the backend server in order to learn useful information about an object, there is no need for Reader-to-Tag authentication in this case. Instead, we can require reader to authenticate to the backend server before sending a meta-ID.
 We proposed a lightweight authentication protocol based on Gen2 to resist various attacks.
 The proposed tag uses no cryptographic function, and hence, is suitable for low-cost RFIDs. Without changing the protocol flow of Gen2, the existing reader can read both Gen2 tags and Gen2þ tags.
 Gen2þ provides sufficient security level for real-world settings. We analyzed the number of rounds required and the period of key update for practical deployment
smart paper boy
Active In SP

Posts: 2,053
Joined: Jun 2011
21-07-2011, 02:25 PM

.pdf   BasePaper.pdf (Size: 1.12 MB / Downloads: 34)
EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the
identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed
based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags.
Recently, some lightweight authentication protocols conforming to Gen2 have been proposed. However, the message flow of these
protocols is different from Gen2. Existing readers may fail to read new tags. In this paper, we propose a novel authentication protocol
based on Gen2, called Gen2þ, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward
compatibility. Gen2þ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check (CRC) to achieve readerto-
tag authentication. Conversely, Gen2þ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication.
We show that Gen2þ is more secure under tracing and cloning attacks.
Index Terms—Protocol design and analysis, security, privacy.
RADIO Frequency Identification (RFID) tags for the
function of next-generation electronic product code
(EPC) will become one of the most widely used devices
in the near future [1]. An RFID application contains three
basic roles:
1. tag,
2. reader, and
3. back-end database.
Each tag contains a unique identification, often called
the tag identification (TID). The reader is used to query the
tag’s TID and forward it to the back-end database. Once the
tag is found valid, the back-end database will look up its
product information for further processing. RFID tags are
classified into three types: active, semipassive, and passive.
Active tags contain batteries so that they can actively
communicate with the reader. Semipassive tags also contain
batteries but they wait for the reader’s query. As for passive
tags, the power comes from the reader. The class of a tag
represents the effective reading range. The reading range of
a class-0 tag is 5-10 cm, and that of a class-1 tag is up to
several meters.
EPCglobal class-1 generation-2 (Gen2 in brief) [2] was
approved as ISO18000-6C in July 2006. It is widely believed
that Gen2 tags will be the mainstream when developing
RFID applications because the effective reading range is
larger. However, the Gen2 specification has the vulnerability
that the TID is transmitted without any guard. Thus,
in this paper, we focus on the protection of class-1 passive
tags from being accessed by malicious readers.
1.1 Security Threats
Previous studies [1], [3], [4], [5], [6], [7] addressed several
threats to RFID applications:
. Eavesdropping: An adversary listens to all the communications
through Radio Frequency (RF) and
dumps them for later cracking.
. Hotlisting: This attack, similar to eavesdropping,
focuses on matching specific values with his chosen
keywords to understand one’s personal interests,
like his favorite books or his reading behavior.
. Replay attack: An attacker repeats the same messages
logged from eavesdropping to spoof a reader or tag.
. Cloning: Since RFID tags are usually placed in open
environments such as hospitals, schools, and offices,
they may be exposed under all kinds of malicious
tools. An adversary can read the tag and then clone
the tag by writing all the obtained data into a
blank tag.
. Tag tracing: Readers and tags have different abilities
of sending data. Attackers can either identify the
same tag from passively logged messages or interact
actively with the tag to understand its location.
. Invading privacy: Customers may not want eavesdroppers
to know what items they have bought from
the store, which may indicate their interests.
. Data forging: Once RFID technology becomes the
mainstream of retailing, a tag may store extra data
such as date, price, and the place of production for
convenience. However, this also attracts attackers to
modify the price and cause great loss.
. Denial of service: It is an effective attack against some
RFID systems, which utilize locking or killing
approach as their protection. Even though this is
the weakest test when designing secure protocols,

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  graphical password authentication source code download in swing Guest 1 147 31-10-2016, 02:39 PM
Last Post: amrutha735
  graphical password authentication source code download in swing Guest 1 71 31-10-2016, 12:52 PM
Last Post: amrutha735
  unmanned petrol bunk system using rfid for ppt Guest 1 79 31-10-2016, 12:05 PM
Last Post: jaseela123
  abstract seminar on security features of atm Guest 1 57 31-10-2016, 11:47 AM
Last Post: jaseela123
  matlab codes for dsdv routing protocol Guest 1 69 31-10-2016, 11:26 AM
Last Post: amrutha735
  plc based automatic bottle filling and capping system ppt Guest 1 86 31-10-2016, 10:25 AM
Last Post: jaseela123
  ppt for antivirus and content security cluster solution Guest 1 64 29-10-2016, 04:22 PM
Last Post: jaseela123
  mini project on microcontroller based security access system Guest 1 56 29-10-2016, 04:08 PM
Last Post: Dhanabhagya
  ppt on optical data security Guest 2 103 29-10-2016, 03:29 PM
Last Post: Dhanabhagya
  graphical password authentication source code download in swing Guest 1 139 29-10-2016, 03:17 PM
Last Post: amrutha735