Implementation of Secured RFID Mutual Authethentication Protocol
Implementation of Secured RFID Mutual Authethentication Protocol
Implementation of Secured RFID Mutual Authethentication Protocol
Authethentication Protocol
AISHWARYA A NAIRI, K.SIVASANKARAN2
1 Student(Mtech VLSI DESIGN) Dept of ECE(SENSE), Vellore Institute of Technology , Vellore, Tamil Nadu, India,
E-mail: aishwaryaanair17@gmail.com.
2
Associate Professor , Dept of ECE(SENSE), Vellore Institute of Technology, Vellore, Tamil Nadu, India,
E-mail: k.sivasankaran@vit.ac.in.
Abstract—RFID is the most flexible auto identification An efficient way to solve these security problems for passive
technology has a dereliction in its security .Over many years UHF RFID is to adopt a mutual authentication protocol.
researchers are working up on security issues facing in RFID Generally, a RFID application system consists of tag, reader
communication and they come up with mutual authentication and back-end server. So here the paper is divided in to four
Protocol. Here is the lightweight mutual authentication section. Section II will give the Related Works. Section III
protocol which implemented in ASIC based on the EPC global, give an idea about Mutual Authentication Protocol .Section
which is the widely used industrial standard for passive UHF IV is about architecture and design. Next Section is about
RFID communication. Here I incorporated a variable Proposed Modification. Last section is full about
Fibonacci LFSR rather than normal LFSR which will increase
Implementation and results
the security compare to previous works. The RFID blocks were
designed by verilog HDL,synthesized and implemented in SCL
180nm technology.I have used Synopsys EDA tool for design II. RELATED WORKS
and Implementation So many security mutual authentication protocols have
been proposed for passive UHF RFID. Chien classified these
Keywords—RFID,VLFSR,Synopsys,Synthesis,Physical
protocols into four classes [15]. The first class is called “full
Design ,ROM,Cyclic Redunancy check,Fibonocci LFSR
edged class” that supports the conventional cryptographic
function. The second class is called “simple” that should
I. INTRODUCTION support random number generator and one-way hashing
In the new modern era companies wanted to transfer data function on tags. The third class is called “lightweight”
into the computer without just manually typing it so as to protocols that require a random number generator and simple
save time, reduce error, increase the efficiency and to free up functions like CRC checksum. The fourth class is called
the employees to do other useful jobs. This idea led to the “ultra-lightweight” protocols that only involve simple
emergence of a broad ne automatic identification to help bitwise operation (like XOR, AND, OR, etc.). Due to the use
machines to identify objects, captures the information and of random number generator and VLFSR sample function,
transfer the data in to computer automatically..There are our protocol belongs to the lightweight class.
different automatic identification technologies like barcode, To tackle the security issues researchers have proposed
smartcards, biometric scan etc. Of these RFID technology is some Pad generation function which issued to protect the
the most prominent because to capture the information tags various password or crucial data during the transfer. Yu-
without any line of sight, reading information fastly from Jung Huang, Wei Cheng Lin, and Hung-LinLi presented a
multiple objects, hiding the unauthorized author’s thus journal similar to the Pad generation concept, where
increasing security and to detect the distant object data. implemented in FPGA Board. Here they used to produce
There are two types of RFID,,Active and Passive. Unlike cover coding pad to mask the tag’s access password before
active tags Passive does not have an internal power source. It the data is transmitted .Here the information from tag to
derives energy from the electromagnetic signal send by the reader or reader to tag can be accessed by simple exor
reader. Passive RFID tags mainly operates in three different function operation. However the problem with it is the
frequency region., Low Frequency, High Frequency and increase in power dissipation due to increase in hardware.
Ultra High Frequency region. Here our protocol is Lili Wei, Zhaotong Luo, QiangQu, Qing He and Jingwei
implemented in UHF Frequency region, within a range of presented a fully fledged authentication protocol which
860 MHz to 960 MHz, widely used a public key cryptography and also the crypto
RFID communication follows some standards. Out of that GPS method but the problem is the lack of the security proof
widely used standard is EPC Global C1G2 standard. These and also had limitations on the number count of the tag.
are driven standards by Electronic Product Code . The EPC In 2010 ,a Novel anonymous RFID authentication
Gen2 air interface standard was first published in 2004, protocol was presented by Jian Shen Dongmin Choi,
which defines the physical and logical requirements for a Sangman Mohand Ilyong Chung, they denote their protocol
RFID system of interrogators and passive tags, operating in as ARAP which provide a strong privacy and also the
the 860MHz-960MHz. Ultra High Frequency (UHF) range. security aspects by taking the pseudonym concept to protect
Over the year researchers are working on security issues of from the synchronization, disclosure and attack. Here
RFID, Because of the absence of necessary security scheme protocol works without disclosing the real ID’s of the
in EPC Gen2 standard, the radio communication between participating tags and provide strong privacy and security. So
RFID tags and readers raise a number of security issue. the RFID tags substitute pseudonym for all real ID’s and this
RFID tag preshares the Pseudonym ,the secret as well as R3||R2 ⊕ SID by XOR operation. The secret value Sj is
information to backend. obtained based on the SID extracted.
In 2015 Mahsa Fathi and Elham Tavakol claimed and
proved that the ARAP protocol is very badly vulnerable to
the security and the de synchronization and modifies the a
new authentication protocol which takes with hash function
and also the PRNG (Pseudo Random Number
Generation)which safeguards the information ROM
attackers. 2015 Yu-Jung Huang, Wei-Cheng Lin, and Hung-
Lin Li proposed a new lightweight authentication protocol
based on TRNG which will provide more security compared
go previous works but with little high power dissipation. .In
this thesis, I modify the design to provide better secure
communication from tag to reader by incorporating a
Fibonacci LFSR in the design.
Figure 2. Mutual Authentication Protocol
Using these we generate 32 bit random number Rb by
passing it through the same LFSR structure as in tag. The
III. MUTAL AUTHENTICATION PROTOCOL tag authentication is done by verifying whether Rt is same
as that of Rb.If they are equal secret value Sj + 1 = R3||R2⊕
Figure below shows the state diagram of tags pa. The tag Sj, SIDj + 1 = LFSR(R1||R2,SID) and LFSR(R1||R2,SID) is
implements seven states. The authentication phase is done in sent to the tag through reader for server authentication. The
secure state or open state but since there is an update going tag updates secret value and SID as Sj + 1 = R3||R2⊕Sj,
on with the secret value and SID we implement the protocol SIDj + 1 = LFSR(R1||R2,SID) after a valid server
insecuredstate. authentication. This marks the end of protocol for the jth
section. If Rt 6= Rb server finds the previous secret value
and SID which will be the inputs for the LFSR function ie
Rt = LFSR(R1||R2,Sj −1) and protocol continues as
mentioned earlier. This is done so as to prevent
synchronization problems. But if still Rt ≠ Rb the protocol
ends here ie. the tag authentication has failed. The security
is said to have protection from Eavesdropping, Location
Tracking, Replay Attack, Forward Security, Confidentiality,
Man-in-the-Middle Attack, De-Synchronization Attack and
Mutual Authentication
Figure11.FM Encoder
5)RFID Main module:
For the simulation we have considered the following inputs.
• R1=17B6h
• R2=AA10h
• R3=BBF1h
•Sa=45ADBECFh
• Sb=14h
• Sid=DAAEDD10h
• TRCAL=6410 Here the results are optimized with synopsys DC Compiler.
Comparison of Results:
VII.CONCLUSION
In this paper ,an RFID light weight mutual authentication
protocol is implemented I modified VLFSR to get
Fibonacci LFSR in order to get more, which shows
significant reduction in area and power as compared to
Figure 10 :Basic RFID Protocol existing digital baseband architecture. The implemented
architectureisoftheEPCClass1Generation2standardsandisaso
lutionforthedereliction in its security. The architecture
consisted of a PIE decoder for decoding the message signal
send from the interrogator to tag, a LFSR for implementing
the protocol, A clock management module for providing a
clock to the encoder for backscattering the message signal
back from Tag to interrogator in a specific frequency , ROM
for storing random number values,CRC5 and CRC16
modules for checking bit errors and an encoder for e
backscattering the message signal back to the interrogator.
The protocol was successfully verified by Verilog Test
bench and synthesized in Synopsys DC compiler.
REFERENCES