IJSRSET1844442 | Received : 03 April 2018| Accepted : 15 April 2018 | March-April-2018 [(4) 4 : 1095-1098 ] © 2018 IJSRSET | Volume 4 | Issue 4 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099 Themed Section : Engineering and Technology 1095 - A Novel Approach for Authentication of RFID Devices Suthar Monali, Prof. Alka J Patel IT Department, LDCE, Ahmedabad, Gujarat, India ABSTRACT RFID is a wireless technology for automatic identification and data capture and it’s the core technology to implement the internet of things. Because of that, the security issue of RFID is becoming more important. In past , simple mathematical and logical method, hash based schemas and simple PKI schemas are introduce RFID authentication . In this paper we illustrate about the possible security attack on RFID and introduce a novel approach using pre computing function and also discuss security analysis. Keywords: RFID, Reader, Tag, Backend Sever , Authentication , Security , ECC. I. INTRODUCTION RFID system is composed of tags, readers, backend sever, and antennas. RFID tags are available in affordable charges, wireless devices which can be communicate with RFID readers [1].RFID architecture shown in figure 1 which consist tag, reader and back-end server. Tag consist EPC (electronic product code) which store details about tag. Reader is responsible for reading and writing tag information. Back end sever will save all data about tag which are in one group .Communication in RFID network will start on reader broadcast message or query. Communication between tag-reader and reader-server is in insecure channel. In this paper we first analyse security attack possible on RFID and discuss RFID device performance measurement in section II, literature survey discuss in section III, proposed schema discussed in section IV. Security analysis discussed in section V. Comparison shown in section VI. Figure 1 II. SECURITY ATTCK ON RFID AND PERFORMANCE MEASUREMENT Denial of Service (DOS) : In both of wireless and wired communication, there are Denial of Service (DOS) . Once attackers control a large number of fake readers and tags, they can make the data connection to abuse computational resources, and even use up the resources and network bandwidth.[1] Eavesdropping: The communication channel between the tag and the reader can be eavesdropped, because the radio frequency channel is not secure communication channel .[2] User privacy : The attacker can monitor the tag using the tag identifier in order to know the user’s behaviour, when the user identity is linked to a certain tag. Also, the attacker can trace the user location with the tag identifier, when the output of the tag such as the tag identifier is unchangeable.[2] Replay attack : The attacker obtains messages between the tag and the reader by eavesdropping and reuses the message in order to impersonate a legitimate tag or a legitimate reader.[2]