Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security and collision in RFID systems

View through CrossRef
Abstract Radio Frequency Identification (RFID) is a promising technology to provide automated contactless identification of objects, people and animals. The identification process is performed as the reader receives simultaneous responses from various tags over a shared wireless channel and without no requirement of line-of-sight in the interrogation zone. The communication between the reader and tags is separated into two processes: identification and acknowledgment processes. Both processes suffer from serious drawbacks that limit the proliferation of RFID. Such drawbacks are security and privacy and collision problems. This thesis has two main parts. The first part examines the security and privacy of the existing RFID authentication protocols. We introduced a novel cryptographic scheme, Hacker Proof Authentication Protocol (HPAP) that allows mutual authentication and achieves full security by deploying tag static identifier, updated timestamp, a one-way hash function and encryption keys with randomized update using Linear Feedback Shift Register (LFSR). Cryptanalysis and simulation show that the protocol is secure against various attacks. In comparison with the various existing RFID authentication protocols, our protocol has less computation load, requires less storage, and costs less. The second part focuses on solving RFID collision arbitration imposed by the shared wireless link between a reader and the many tags distributed in the interrogation zone. In most proposed anticollision algorithms, tags reply randomly to the time slots chosen by the reader. Since more than two tags may choose the same time slot in a frame, this Random Access (RA) causes garbled data at the reader side resulting the identification process fails. Towards this challenge, two ALOHA based anti-collision algorithms that adopt a new way for tags to choose their replied time slots to enhance system efficiency are presented. In MBA and LTMBA, tags use modulo function to choose their owned time slot. The difference between the two algorithms relies on the method by which the reader estimates the next frame size. The performance evaluation of the two algorithms shows better performance than previously proposed algorithms in terms of fewer communication rounds and fewer collided/empty slots considering the limitation of the EPCglobal Class-1 Gen-2 standard.
Ryerson University Library and Archives
Title: Security and collision in RFID systems
Description:
Abstract Radio Frequency Identification (RFID) is a promising technology to provide automated contactless identification of objects, people and animals.
The identification process is performed as the reader receives simultaneous responses from various tags over a shared wireless channel and without no requirement of line-of-sight in the interrogation zone.
The communication between the reader and tags is separated into two processes: identification and acknowledgment processes.
Both processes suffer from serious drawbacks that limit the proliferation of RFID.
Such drawbacks are security and privacy and collision problems.
This thesis has two main parts.
The first part examines the security and privacy of the existing RFID authentication protocols.
We introduced a novel cryptographic scheme, Hacker Proof Authentication Protocol (HPAP) that allows mutual authentication and achieves full security by deploying tag static identifier, updated timestamp, a one-way hash function and encryption keys with randomized update using Linear Feedback Shift Register (LFSR).
Cryptanalysis and simulation show that the protocol is secure against various attacks.
In comparison with the various existing RFID authentication protocols, our protocol has less computation load, requires less storage, and costs less.
The second part focuses on solving RFID collision arbitration imposed by the shared wireless link between a reader and the many tags distributed in the interrogation zone.
In most proposed anticollision algorithms, tags reply randomly to the time slots chosen by the reader.
Since more than two tags may choose the same time slot in a frame, this Random Access (RA) causes garbled data at the reader side resulting the identification process fails.
Towards this challenge, two ALOHA based anti-collision algorithms that adopt a new way for tags to choose their replied time slots to enhance system efficiency are presented.
In MBA and LTMBA, tags use modulo function to choose their owned time slot.
The difference between the two algorithms relies on the method by which the reader estimates the next frame size.
The performance evaluation of the two algorithms shows better performance than previously proposed algorithms in terms of fewer communication rounds and fewer collided/empty slots considering the limitation of the EPCglobal Class-1 Gen-2 standard.

Related Results

Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and war...
Enhancing RFID system configuration through semantic modelling
Enhancing RFID system configuration through semantic modelling
Abstract Radio-Frequency Identification (RFID) system technology is a key element for the realization of the Industry 4.0 vision, as it is vital for tasks such as entity trackin...
Collision risk analysis of mega constellations in low Earth orbit
Collision risk analysis of mega constellations in low Earth orbit
Abstract The LEO megaconstellations have thousands of satellites, which operate on similar orbital heights. Because of increasing space debris, the satellites accelerate th...
Implementation of RFID for Verification of PC Usage in the UMSIDA’s Electrical Engineering Laboratory Based on the Internet of Things
Implementation of RFID for Verification of PC Usage in the UMSIDA’s Electrical Engineering Laboratory Based on the Internet of Things
Every day visitors to the UMSIDA electrical engineering laboratory have different goals. The main function of the laboratory is as a practicum for electrical engineering students a...
Erratum
Erratum
Bach MP, Zoroja J and Loupis M. RFID usage in European enterprises and its relation to competitiveness: Cluster analysis approach. International Journal of Engineering Business Man...
Evaluating the academic trend of RFID technology based on SCI and SSCI publications from 2001 to 2014
Evaluating the academic trend of RFID technology based on SCI and SSCI publications from 2001 to 2014
Radio frequency identification (RFID) is one of the most influential technologies of the twenty-first century. Today, RFID technology is being applied in a wide array of discipline...
Evaluating the academic trend of RFID technology based on SCI and SSCI publications from 2001 to 2014
Evaluating the academic trend of RFID technology based on SCI and SSCI publications from 2001 to 2014
Radio frequency identification (RFID) is one of the most influential technologies of the twenty-first century. Today, RFID technology is being applied in a wide array of discipline...
Security and collision in RFID systems
Security and collision in RFID systems
Abstract Radio Frequency Identification (RFID) is a promising technology to provide automated contactless identification of objects, people and animals. The identification process ...

Back to Top