TRMA: An Efficient Approach for Mutual Authentication of RFID Wireless Systems

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 765)

Abstract

In today’s world, transmission and reception of data secrecy are the foremost concerns in wireless communication. Recently Radio Frequency Identification (RFID) has perceived the massive amount of attention as it inhibits privacy invasions and data disclosure. An entire generation of new security and privacy attacks might arise as the RFID technologies have a widespread deployment all over. One of the significant drawbacks in RFIDs are the unsteady authentication, either the password itself is leaked else data among the reader and a tag. Also, researchers have observed that there are threatening security drawbacks in Electronic Product Code-Class I Generation 2 (EPC-C1G2). To overcome this issue, a function called as the Pad Generation is used that assists in refining the security parameter in the mutual authentication scheme. This paper stresses on Tag-Reader Mutual Authentication (TRMA) - system of RFID tag-reader with the modified version of PadGen. The modified Pad-Gen design uses XOR operation for the RIFD-TRMA protocol. For the cost-effective hardware implementation, the proposed framework is simulated on FPGA Artix7-XC7A100T-3CSG324 device and physically verified on Chip scope pro tool.

Keywords

Security Authentication RFID Mutual authentication scheme Tag identification 

References

  1. 1.
    Chen, M., et al.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE/ACM Trans. Network. (TON) 24(2), 703–716 (2016)CrossRefGoogle Scholar
  2. 2.
    Gao, L., et al.: An ultra lightweight RFID authentication protocol with CRC and permutation. J. Netw. Comput. Appl. 41, 37–46 (2014)CrossRefGoogle Scholar
  3. 3.
    Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Huang, Y.-J., et al.: Hardware implementation of RFID mutual authentication protocol. IEEE Trans. Ind. Electron. 57(5), 1573–1582 (2010)CrossRefGoogle Scholar
  5. 5.
    Feldhofer, M.: An authentication protocol in a security layer for RFID smart tags. In: Proceedings of the 12th IEEE Mediterranean Electro-technical Conference, MELECON 2004, vol. 2. IEEE (2004)Google Scholar
  6. 6.
    Maarof, A., et al.: Authentication protocol conforming to EPC class-1 Gen-2 standard. In: International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE (2016) Google Scholar
  7. 7.
    Lai, Y.-C., et al.: A novel query tree protocol with bit tracking in RFID tag identification. IEEE Trans. Mob. Comput. 12(10), 2063–2075 (2013)CrossRefGoogle Scholar
  8. 8.
    Liu, X., et al.: An adaptive tag anti-collision protocol in RFID wireless systems. China Commun. 11(7), 117–127 (2014)CrossRefGoogle Scholar
  9. 9.
    Maguire, Y., Pappu, R.: An optimal Q-algorithm for the ISO 18000-6C RFID protocol. IEEE Trans. Autom. Sci. Eng. 6(1), 16–24 (2009)CrossRefGoogle Scholar
  10. 10.
    Ning, H., et al.: Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun. 5(12), 1755–1768 (2011)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Preradovic, S., et al.: Multiresonator-based chipless RFID system for low-cost item tracking. IEEE Trans. Microw. Theor. Tech. 57(5), 1411–1419 (2009)CrossRefGoogle Scholar
  12. 12.
    Sakai, K., et al.: A novel coding scheme for secure communications in distributed RFID systems. IEEE Trans. Comput. 65(2), 409–421 (2016)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Sun, H.-M., Ting, W.-C., Wang, K.-H.: On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secure Comput. 8(2), 315–317 (2011)CrossRefGoogle Scholar
  14. 14.
    Tan, C.C., Sheng, B., Li, Q.: Secure and serverless RFID authentication and search protocols. IEEE Trans. Wirel. Commun. 7(4), 1400–1407 (2008)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Yin, J., et al.: A system-on-chip EPC Gen-2 passive UHF RFID tag with embedded temperature sensor. IEEE J. Solid-State Circ. 45(11), 2404–2420 (2010)Google Scholar
  16. 16.
    Yu, J., et al.: Finding needles in a haystack: missing tag detection in large RFID systems. IEEE Trans. Commun. (2017) Google Scholar
  17. 17.
    Zhang, L., Zhang, J., Tang, X.: Assigned tree slotted aloha RFID tag anti-collision protocols. IEEE Trans. Wirel. Commun. 12(11), 5493–5505 (2013)CrossRefGoogle Scholar
  18. 18.
    Zhu, L., Yum, T.-S.P.: The optimal reading strategy for EPC Gen-2 RFID anti-collision systems. IEEE Trans. Commun. 58(9), 2725–2733 (2010)CrossRefGoogle Scholar
  19. 19.
    Zheng, Y., Li, M.: Fast tag searching protocol for large-scale RFID systems. IEEE/ACM Trans. Network. (TON) 21(3), 924–934 (2013)CrossRefGoogle Scholar
  20. 20.
    Oren, Y., Shamir, A.: Remote password extraction from RFID tags. IEEE Trans. Comput. 56(9), 1292–1296 (2007)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Myung, J., et al.: Tag-splitting: adaptive collision arbitration protocols for RFID tag identification. IEEE Trans. Parallel Distrib. Syst. 18(6), 763–775 (2007)CrossRefGoogle Scholar
  22. 22.
    Luo, W., et al.: Efficient missing tag detection in RFID systems. In: IEEE INFOCOM 2011 Proceedings (2011)Google Scholar
  23. 23.
    Huang, X., et al.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390–1397 (2011)CrossRefGoogle Scholar
  24. 24.
    Han, H., et al.: Counting RFID tags efficiently and anonymously. In: IEEE INFOCOM 2010 Proceedings (2010)Google Scholar
  25. 25.
    Doss, R., Zhou, W., Shui, Yu.: Secure RFID tag ownership transfer based on quadratic residues. IEEE Trans. Inf. Forensics Secur. 8(2), 390–401 (2013)CrossRefGoogle Scholar
  26. 26.
    Fabian, B., Ermakova, T., Muller, C.: SHARDIS: a privacy-enhanced discovery service for RFID-based product information. IEEE Trans. Industr. Inf. 8(3), 707–718 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringNMAM Institute of Technology NITTEUdupiIndia

Personalised recommendations