International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2012 1
ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Secure Access of RFID System
Salim G Shaikh and Shankar D Nawale.
Abstract— Radio Frequency Identification (RFID) is a wireless technology; it considered the way to replace the barcode, RFID used for
the purposes of automatic identification and tracking of object attach with tag. Since the barcode is data read with line of sight and limits the
utility for item-level of logistic and supply chain application in the future. While implementing the RFID in various applications we have to
consider security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and privacy were proposed. In this
paper, we describe security model of the tag and Reader by using the Reader ID and Tag ID and surveys the literature of hash-based
access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag.
Index Terms— Reader-ID, Tag-ID, hash-based protocol, RFID, Secure Access Control,WSRE Scheme,Chien Scheme,TripleDES.
—————————— ——————————
1 INTRODUCTION
Radio Frequency Identification (RFID) technology, one of the
forerunners of pervasive computing, is widely regarded as the
successor of optical bar codes. Industries of manufacturing,
supply chain management, and inventory control can benefit
this technology to help reduce the costs wherever bar codes
used to dominate.
The use of RFID in tracking and access application first ap-
peared during the 1980s [1]. At the end of the 1980s, the major
growth of contactless smart cards has been use passive tags,
especially in access.
The use of RFID tags has been rapidly increased since the
largest retailer in the United States; Wal-Mart mandated their
use in 2003 for its top 100 suppliers [1]. With RFID, wireless
automatic identification takes a very specific form: the object,
location, or individual is marked with a unique identifier code
contained with an RFID tag, which is in some way attached to
or embedded in the target. RFID is not a single product but a
comprehensive system, a typical RFID system include three
basic elements: RFID tag(transponder), reader(transceiver) and
back-end application system(or database), which demands the
support of the computer network. A typical RFID system is
shown in the Figure 1.
Most RFID tags are passive, means that they are battery less
and they obtain power to operate from the reader. When an
RFID reader emits a radio signal, tags in vicinity respond by
transmitting their stored data to the reader automatically, and
from a range of several meters. However, the barrier that the
RFID system is facing presently is the issue of possibility of data
security and privacy violation which could be as a result of il-
legal access [2].
Fig. 1 A Typical RFID System
Active tags contain an on-board power source, such as a
battery, as well as the ability to initiate their own communica-
tions; possibly with other tags. Semi-passive tags have a bat-
tery, but may only respond to incoming transmissions. Passive
tags receive all power from the reader and necessarily cannot
initiate any communications. [3]
A tag’s power source determines both its range and cost.
Passive tags are the cheapest to manufacture and incorporate
into packaging, yet have the shortest read range. Semi passive
tags have moderate range and cost, while active tags have the
greatest range and cost. Semi-passive and active tags’ on-
board power source may also power a clock or integrated sen-
sors. Refer to Table 1.1 for a comparison of the various tag
types.
————————————————
Author Shaikh Salim is currently pursuing masters degree program in
Computer Engineering in Sinhgad Institute of Technology, Loanvala in
pune University, India, PH-09960726716. E-mail: shaikhsg2@gmail.com ,
Co-Author Shankar Nawale is Guide and currently Head of the deparment
Telecommunication Engineering in Sinhgad Institute of Technology, Loan-
vala India, PH-02114 407475. E-mail: shnkarnawale125@rediffmail.com .