International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2012 1 ISSN 2229-5518 IJSER © 2012 http://www.ijser.org Secure Access of RFID System Salim G Shaikh and Shankar D Nawale. AbstractRadio Frequency Identification (RFID) is a wireless technology; it considered the way to replace the barcode, RFID used for the purposes of automatic identification and tracking of object attach with tag. Since the barcode is data read with line of sight and limits the utility for item-level of logistic and supply chain application in the future. While implementing the RFID in various applications we have to consider security and privacy risk in RFID adoption. Until now, many researches on the RFID’s security and privacy were proposed. In this paper, we describe security model of the tag and Reader by using the Reader ID and Tag ID and surveys the literature of hash-based access control scheme and propose an effective scheme to enhance the security and privacy about the passive RFID tag. Index TermsReader-ID, Tag-ID, hash-based protocol, RFID, Secure Access Control,WSRE Scheme,Chien Scheme,TripleDES. —————————— —————————— 1 INTRODUCTION Radio Frequency Identification (RFID) technology, one of the forerunners of pervasive computing, is widely regarded as the successor of optical bar codes. Industries of manufacturing, supply chain management, and inventory control can benefit this technology to help reduce the costs wherever bar codes used to dominate. The use of RFID in tracking and access application first ap- peared during the 1980s [1]. At the end of the 1980s, the major growth of contactless smart cards has been use passive tags, especially in access. The use of RFID tags has been rapidly increased since the largest retailer in the United States; Wal-Mart mandated their use in 2003 for its top 100 suppliers [1]. With RFID, wireless automatic identification takes a very specific form: the object, location, or individual is marked with a unique identifier code contained with an RFID tag, which is in some way attached to or embedded in the target. RFID is not a single product but a comprehensive system, a typical RFID system include three basic elements: RFID tag(transponder), reader(transceiver) and back-end application system(or database), which demands the support of the computer network. A typical RFID system is shown in the Figure 1. Most RFID tags are passive, means that they are battery less and they obtain power to operate from the reader. When an RFID reader emits a radio signal, tags in vicinity respond by transmitting their stored data to the reader automatically, and from a range of several meters. However, the barrier that the RFID system is facing presently is the issue of possibility of data security and privacy violation which could be as a result of il- legal access [2]. Fig. 1 A Typical RFID System Active tags contain an on-board power source, such as a battery, as well as the ability to initiate their own communica- tions; possibly with other tags. Semi-passive tags have a bat- tery, but may only respond to incoming transmissions. Passive tags receive all power from the reader and necessarily cannot initiate any communications. [3] A tag’s power source determines both its range and cost. Passive tags are the cheapest to manufacture and incorporate into packaging, yet have the shortest read range. Semi passive tags have moderate range and cost, while active tags have the greatest range and cost. Semi-passive and active tags’ on- board power source may also power a clock or integrated sen- sors. Refer to Table 1.1 for a comparison of the various tag types. ———————————————— Author Shaikh Salim is currently pursuing masters degree program in Computer Engineering in Sinhgad Institute of Technology, Loanvala in pune University, India, PH-09960726716. E-mail: shaikhsg2@gmail.com , Co-Author Shankar Nawale is Guide and currently Head of the deparment Telecommunication Engineering in Sinhgad Institute of Technology, Loan- vala India, PH-02114 407475. E-mail: shnkarnawale125@rediffmail.com .