Abstract

Radio Frequency Identification (RFID) technology is being deployed increasingly in diverse applications and has become pervasive and ubiquitous. While the characteristics of RFID make recognition possible without physical contact, it also has many problems pertaining to privacy and security. This has led to slow adaptation of RFID technology for large number of applications. Moreover, any approach without addressing the crucial factors like, scalability, flexibility, cost, performance, computational resources and ease of use is not acceptable for deploying the RFID technology. This project provides an introduction to RFID technology and the privacy and security threats it faces. It reviews recently proposed RFID authentication techniques, and presents an FPGA-based RFID tag with a secure authentication protocol between the tag and reader, addressing all RFID security issues and threats including forward secrecy, eavesdropping, tracking, cloning, replay attack and denial of service attack. The project explores RFID authentication protocol using the Altera's Nios II embedded processor that provides a flexible exploration environment.

Highlights

  • Radio frequency identification (RFID) is an emerging technology, which brings enormous productivity benefits in applications where objects have to be identified automatically

  • The behavior of the RFID tag is developed in an embedded C program which will be compiled and run on Nios II embedded processor

  • This project report presented the design and implementation of an extensible flexible RFID tag that deploys a robust authentication protocol based on .randomized access control

Read more

Summary

Introduction

Radio frequency identification (RFID) is an emerging technology, which brings enormous productivity benefits in applications where objects have to be identified automatically. The main benefits of RFID systems are that they can provide automated and multiple identification capture and analysis. One can read several RFID tags in the field at the same time automatically to track valuable objects [1]. While the RFID feature of recognition without physical contact provides convenience to the user; many problems pertaining to privacy and security still exist. This has led to the slow adaptation of RFID systems in a number of applications. RFID uses radio frequency for information transfer between tags and readers.

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.