Identification and Authentication for RFID Systems

Author(s):  
Behzad Malek

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.

2013 ◽  
pp. 1682-1704 ◽  
Author(s):  
Behzad Malek ◽  
Ali Miri

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.


Author(s):  
Kassy M. Lum ◽  
Donnie Proffitt ◽  
Ann Whitney ◽  
Johné M. Parker

Radio Frequency Identification (RFID) is a disruptive technology that uses radio waves to uniquely identify objects. As such, it has the potential to bring significant benefits to numerous government and private sector initiatives. However, significant technical challenges remain. A key area of study is in system performance: while the major hardware components in an RFID system (i.e., tags, readers and middleware) have been and continue to be studied extensively, there has been little research, comparatively, in characterizing RFID system performance. The research presented in this paper was inspired, in part, by a laser printer RFID solution; i.e., one in which the printer simultaneously prints and programs ultra-high frequency (UHF) tags embedded in print media. In this paper, we have conducted a detailed experimental investigation of the primary factors influencing the performance of RFID systems similar to the print solution. This study aims to provide a systematic experimental process for investigating key factors — e.g., the air gap between reader antenna and tag, in-plane orientation of the tag with respect to the reader antenna, and power level output of the reader — which affect the programmability of UHF RFID tags. Results provide a baseline evaluation of the functionality of RFID systems of similar designs and provide a basis for a detailed exploration of the primary factors which affect RFID UHF passive tag dynamic programming capabilities. By understanding which factors significantly affect the readability and programming of RFID tags, this research suggests optimal designs for system functionality and provides data needed in order to advance such designs. Additionally, a key obstacle for RFID implementation is tag selection. Effectively matching tags to applications requires numerous economic and technical considerations; these considerations generate different implementation constraints. This paper lays the foundation for a multi-objective optimization algorithm to help determine optimal tag selection for a given application, based upon tag performance and cost.


Author(s):  
Imad Belkacem ◽  
Safia Nait Bahloul ◽  
Oum-El-Kheir Aktouf

Dependability issues become more and more significant in RFID (Radio Frequency Identification) development and especially in critical domains. However, Operations of reading, detection of readers, and measurements of sensors in a RFID system are inevitably subjected to errors. These factors degrade the overall dependability of RFID systems. The authors study the Fault Tolerance in RFID systems as a means to ensure the dependability. The authors propose to perform a statistical analysis on the RFID tags data, using a confidence interval, at the level of the middleware enabling the detection of erroneous readers and sensors.


2013 ◽  
Vol 325-326 ◽  
pp. 1774-1777
Author(s):  
Yi Jun Cui ◽  
Cheng Hua Wang ◽  
Chun Lin Chen

Active RFID systems are widely used in modern industries. Typical application of the active RFID system is the identification and the position tracking of warehouse and freight container. Traditional design methods of active RFID system need special RFID readers to read and write the active RFID tags. This paper presents a novel active RFID system that can be easily read by smart phones. This new active RFID system was based on Bluetooth Low Energy. In the system, any device equipped with Bluetooth 4.0 such as iPhone 4S or the android based smart phones can be used as the reader. It was easy to use and costs effective. In the paper, we describe the detailed design of the novel active RFID system and the performance evaluation of the system.


Author(s):  
Atul Kumar ◽  
Ankit Kumar Jain

Radio frequency identification (RFID) consists of a tag and reader. The RFID system is used in various places, such as finding the location of devices and toll payment. In computer security, CIA (confidentiality, integrity, authentication) is the primary concern for RFID security. In existing scenario, there are various threats present in the RFID system such as de-synchronization attack, disclosure attack, tracking attack and so on. There are various threats that RFID systems are vulnerable to such as a de-synchronization attack, disclosure attack, dos attack, and tracking attack. This chapter discusses various attacks on the RFID system in terms of confidentiality, integrity, and availability as these devices contain a limited amount of memory and low power battery. Therefore, these devices need a lightweight solution for the RFID system. Hence, this chapter additionally discusses various authentication schemes such as lightweight scheme and ultra-lightweight scheme for RFID systems.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Geoffrey Ramadan

An RFID system is an enabling technology encompassing both hardware and software. This chapter presents a software interface that integrates both middleware and enterprise software to automate the RFID system. The developed software is called Edgeware. The chapter presents an industrial perspective of complete implementation of an RFID system to automate the whole process of a big and complex business. In this chapter the definition, evaluation, value proposition, and implementation procedure of Edgeware are presented.


Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Sign in / Sign up

Export Citation Format

Share Document