Вы находитесь на странице: 1из 3

RFID AUTHENTICATION

ABSTRACT:
RADIO Frequency Identification (RFID) tags for the function of next-generation
electronic product code (EPC) will become one of the most widely used devices in the
near future an RFID. Once the tag is found valid, the back-end database will look up its
product information for further processing. RFID tags are classified into three types:
active, semi passive, and passive. Active tags contain batteries so that they can actively
communicate with the reader. Semi passive tags also contain batteries but they wait for
the readers query. As for passive tags, the power comes from the reader. The class of a
tag represents the effective reading range. We analyzed the number of rounds required
and the period of key update for practical deployment.
EXISTING SYSTEM:
Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes,
another common automatic identification system, have been a familiar packaging feature
on consumer items for years. Due to advances in silicon manufacturing technology, RFID
costs have dropped significantly. In the near future, low-cost RFID electronic product
codes or smart-labels may be a practical replacement for optical barcodes on
consumer items. Unfortunately, the universal deployment of RFID devices in consumer
items may expose new security and privacy risks not present in closed manufacturing
environments. This presents an introduction to RFID technology, identifies several
potential threats to security and privacy, and offers several practical proposals for
efficient security mechanisms. We offer several policy suggestions and discuss various
open questions and areas of research.

PROPOSED SYSTEM:
In this project, we propose a novel authentication protocol based on Gen2, called Gen2+,
for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide
backward compatibility. Gen2+ is a multiple round protocol using shared pseudonyms
and Cyclic Redundancy Check to achieve reader-to-tag authentication. Conversely,
Gen2+ uses the memory read command defined in Gen2 to achieve tag-to-reader
authentication. We show that Gen2+ is more secure under tracing and cloning attacks.
HARDWARE REQUIREMENTS:
System

: Pentium Iv 2.4 Ghz

Hard Disk

: 40 Gb

Ram

: 256 Mb

SOFTWARE REQUIREMENTS:
Operating system

:- Windows XP Professional

Front End

: - Asp .Net 2.0.

Coding Language

:- Visual C# .Net

Back-End

: - Sql Server 2000.

Modules:
1. Tag reader authentication module.
2. Crypt analysis module.
3. DB verification Module.
4. Private and Public mode module.
Module Description:
1. Tag reader authentication module.
An RFID reader is a device that is used to interrogate an RFID tag. The reader has an
antenna that emits radio waves; the tag responds by sending back its data.

A number of factors can affect the distance at which a tag can be read (the read range).
The frequency used for identification, the antenna gain, the orientation and polarization
of the reader antenna and the transponder antenna, as well as the placement of the tag on
the object to be identified will all have an impact on the RFID systems read range.
2. Crypt analysis module.
Lightweight authentication protocol based on Gen2 to resist various attacks. The
proposed tag uses no cryptographic function, and hence, is suitable for low-cost RFIDs.
Without changing the protocol flow of Gen2, the existing reader can read both Gen2 tags
and Gen2+| tags. Gen2+ provides sufficient security level for real-world settings. We
analyzed the number of rounds required and the period of key update for practical
deployment.
3. DB verification Module.
Database used there first to reenroll the clients information and after its verified by
admin after that is stored in server for future request for tag readers.
4. Private and Public mode module.
Private mode and switched back whenever they want. Under such a scenario, our scheme
provides flexibility between the private mode and the public mode. For those items,
which need to be invisible from the outside world? users switch them into the private
mode by setting the threshold value t to 0. Then, the tag can avoid tracing and skimming
attacks. They can pass through attackers effective reading range in a public domain. In
addition, these tags in their private mode react to the malicious reader one after another
by sending nonsense just like passive-jamming tags. As for the public mode, we set t to a
higher value. Then, the reading speed increases rapidly. However, this also exposes the
tag to the environment. This is configurable according to users preference.

Вам также может понравиться