Bit Shuffling Query Tree Algorithm for Secure Communication in RFID Networks

نویسندگان

  • Nivedita Das
  • Indrajit Bhattacharya
چکیده

RFID uses radio frequency waves to track and identify objects. RFID system consists of tags and readers. Passive RFID tags are more popular now days due to its simpler circuitry, lower weight and lower cost. Generally passive tags are attached with an object for unique identification. A tag contains information about the particular product, to which it is attached. RFID reader is used to interrogate the tag to get the identity of the product attached with. RFID has numerous applications such as inventory management, asset tracking, library management etc. One of the major problems with RFID system is that whenever a reader interrogates a tag, all the tags residing in the read zone of the reader responds to the reader, which results in a collision at the reader‟s side. Thus makes it impossible to read the tags in time. To minimize the problem of collision at the reader side several anti collision algorithms has been proposed, but none of the algorithm concerns about the security aspect. Security is another major problem of RFID system. RFID tag discloses its identity to any reader which interrogates the tag, so any illegitimate reader can obtain the information contained in the tag. Now a day‟s situation is much worse because not only unique identification number but also user information such as name, address, phone number and other relevant information‟s of consumer are stored in the tag. There are different manufacturers of tags who provide tags with 1kb memory, which is large enough to store such kind of consumer information without pointing to backend database. In such cases security concern is much more as eavesdropping may lead to disclose some personal data, which is a big threat for consumer. Implementing cryptographic algorithm is not a feasible solution for the RFID system, as this may result in complex circuitry, and which in turn may raise size and cost of the passive tags. Here in this paper we have combined both the problem of collision and security together to find a suitable solution which solves both the problems. Taking into consideration of simpler circuitry and lower price of passive tags, here we propose a solution which modifies existing anti collision protocol to make it secure so that any illegitimate reader cannot read the information contained in the tag thus protecting tags from malicious reading.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning

In this whitepaper, we present a synchronization-based communication protocol for EPCglobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitim...

متن کامل

Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and Cloning

In this whitepaper, we present a synchronization-based communication protocol for EPCGlobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012