IJSRSET1844442 | Received : 03 April 2018| Accepted : 15 April 2018 | March-April-2018 [(4) 4 : 1095-1098 ]
© 2018 IJSRSET | Volume 4 | Issue 4 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099
Themed Section : Engineering and Technology
1095
-
A Novel Approach for Authentication of RFID Devices
Suthar Monali, Prof. Alka J Patel
IT Department, LDCE, Ahmedabad, Gujarat, India
ABSTRACT
RFID is a wireless technology for automatic identification and data capture and it’s the core technology to
implement the internet of things. Because of that, the security issue of RFID is becoming more important. In
past , simple mathematical and logical method, hash based schemas and simple PKI schemas are introduce RFID
authentication . In this paper we illustrate about the possible security attack on RFID and introduce a novel
approach using pre computing function and also discuss security analysis.
Keywords: RFID, Reader, Tag, Backend Sever , Authentication , Security , ECC.
I. INTRODUCTION
RFID system is composed of tags, readers, backend
sever, and antennas. RFID tags are available in
affordable charges, wireless devices which can be
communicate with RFID readers [1].RFID
architecture shown in figure 1 which consist tag,
reader and back-end server. Tag consist EPC
(electronic product code) which store details about
tag. Reader is responsible for reading and writing tag
information. Back end sever will save all data about
tag which are in one group .Communication in RFID
network will start on reader broadcast message or
query. Communication between tag-reader and
reader-server is in insecure channel.
In this paper we first analyse security attack possible
on RFID and discuss RFID device performance
measurement in section II, literature survey discuss in
section III, proposed schema discussed in section IV.
Security analysis discussed in section V. Comparison
shown in section VI.
Figure 1
II. SECURITY ATTCK ON RFID AND
PERFORMANCE MEASUREMENT
Denial of Service (DOS) : In both of wireless and
wired communication, there are Denial of Service
(DOS) . Once attackers control a large number of fake
readers and tags, they can make the data connection
to abuse computational resources, and even use up the
resources and network bandwidth.[1]
Eavesdropping: The communication channel between
the tag and the reader can be eavesdropped, because
the radio frequency channel is not secure
communication channel .[2]
User privacy : The attacker can monitor the tag using
the tag identifier in order to know the user’s
behaviour, when the user identity is linked to a
certain tag. Also, the attacker can trace the user
location with the tag identifier, when the output of
the tag such as the tag identifier is unchangeable.[2]
Replay attack : The attacker obtains messages
between the tag and the reader by eavesdropping and
reuses the message in order to impersonate a
legitimate tag or a legitimate reader.[2]