scholarly journals RFID Security : Tiny Encryption Algorithm And Authentication Protocols

2021 ◽  
Author(s):  
Shirley. Gilbert

With recent advancement in Radio Frequency Identification (RFID) technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has limited resources like memory, power and processing capabilities, authentication must be provided by encryption and decryption procedures that are lightweight consuming minimal resources. This report investigates some relevant RFID encryption algorithms and their possible implementations with respect to security, cost and performance. A survey and brief comparison of the algorithms are performed and the Tiny Encryption Algorithm (TEA) is selected as a feasible solution for encryption and decryption with an acceptable level of security. TEA is implemented on an FPGA (Field Programmable Gate Array) platform. After investigating several state-of-the-art authentication approaches, two protocols are designed incorporating TEA and implemented using VHDL. Simulations corroborate the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance. Potential improvements to enhance the security and strengthen RF communication during authentication are explored.

2021 ◽  
Author(s):  
Shirley. Gilbert

With recent advancement in Radio Frequency Identification (RFID) technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has limited resources like memory, power and processing capabilities, authentication must be provided by encryption and decryption procedures that are lightweight consuming minimal resources. This report investigates some relevant RFID encryption algorithms and their possible implementations with respect to security, cost and performance. A survey and brief comparison of the algorithms are performed and the Tiny Encryption Algorithm (TEA) is selected as a feasible solution for encryption and decryption with an acceptable level of security. TEA is implemented on an FPGA (Field Programmable Gate Array) platform. After investigating several state-of-the-art authentication approaches, two protocols are designed incorporating TEA and implemented using VHDL. Simulations corroborate the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance. Potential improvements to enhance the security and strengthen RF communication during authentication are explored.


2015 ◽  
Vol 2 (2) ◽  
pp. 86-96 ◽  
Author(s):  
M. Zomorrodi ◽  
N.C. Karmakar

The electromagnetic (EM) imaging technique at mm-band 60 GHz is proposed for data encoding purpose in the chipless Radio Frequency Identification (RFID) systems. The fully printable chipless RFID tag comprises tiny conductive EM polarizers to create high cross-polar radar cross-section. Synthetic aperture radar approach is applied for formation of the tag's EM-image and revealing the tag's content. The achieved high data encoding capacity of 2 bits/cm2in this technique based on a fully printable tag is very convincing for many applications. The system immunity to multipath interference, bending effect, and printing inaccuracy suggests huge potentials for low-cost item tagging. Tags are also readable through a tick paper envelop; hence secure identification is provided by the proposed technique.


Author(s):  
Shahid Habib ◽  
Amjad Ali ◽  
Ghaffer Iqbal Kiani ◽  
Wagma Ayub ◽  
Syed Muzahir Abbas ◽  
...  

Abstract This paper presents a polarization-independent 11-bit chipless RFID tag based on frequency-selective surface which has been designed for encoding and relative humidity (RH) sensing applications. The 10 exterior U-shaped resonators are used for item encoding whereas Kapton has been incorporated with the interior resonator for RH sensing. This radio-frequency identification (RFID) tag operates in S- and C-frequency bands. The proposed design offers enhanced fractional bandwidth up to 88% with the density of 4.46 bits/cm2. Both single- and dual-layer tags have been investigated. The simulated results are in good agreement with measured results and a comparison with existing literature is presented to show the performance. Simple geometry, high code density, large frequency signature bandwidth, high magnitude bit, high radar cross-section, and angular stability for more than 75° are the unique outcomes of the proposed design. In addition, RH sensing has been achieved by integrating the Kapton on the same RFID tag.


2019 ◽  
Vol 8 (1) ◽  
pp. 13-19
Author(s):  
Meli Mildawati ◽  
Wildian Wildian

Sistem pengaman sepeda motor menggunakan radio frequency identification (RFID) dan notifikasi melalui handphone yang dikontrol dengan modul Arduino Uno telah dirancang bangun. RFID terdiri dari sebuah RFID tag dan RFID reader. RFID tag yang memiliki kode yang berbeda-beda, digunakan sebagai kunci untuk menghidupkan sepeda motor setelah kunci kontak digunakan. RFID reader dapat membaca tag pada jarak maksimal 1,26 cm. Sepeda motor yang dihidupkan tanpa menggunakan RFID tag atau RFID tag tidak sesuai menyebabkan aktifnya reed switch pada pelek roda depan. Ketika roda telah berputar sebanyak empat kali, maka alarm aktif dan GSM SIM 800L mengirimkan notifikasi berupa SMS sebanyak satu kali dan misscall sebanyak tiga kali ke nomor handphone pemilik sepeda motor. Waktu delay rata-rata SMS dan miscall berturut-turut adalah 5,42 s, 8,62 s, 61,14 s dan 113,16 s. Kata kunci: sistem pengaman sepeda motor, RFID, Arduino Uno , reed switch, GSM SIM 800L


2008 ◽  
Vol 07 (01) ◽  
pp. 9-14 ◽  
Author(s):  
Selwyn Piramuthu

Radio Frequency Identification (RFID) is promising, as a technique, to enable tracking of essential information about objects as they pass through supply chains. Information thus tracked can be utilised to efficiently operate the supply chain. Effective management of the supply chain translates to huge competitive advantage for the firms involved. Among several issues that impede seamless integration of RFID tags in a supply chain, one of the problems encountered while reading RFID tags is that of collision, which occurs when multiple tags transmit data to the same receiver slot. Data loss due to collision necessitates re-transmission of lost data. We consider this problem when Framed Slotted ALOHA protocol is used. Using machine learning, we adaptively configure the number of slots per frame to reduce the number of collisions while improving throughput.


Author(s):  
Byungho Jeong ◽  
Chen-Yang Cheng ◽  
Vittal Prabhu

This paper proposes a workflow and performance model for surgery patient identification using RFID (Radio Frequency Identification). Certain types of mistakes may be prevented by automatically identifying the patient before surgery. The proposed workflow is designed to ensure that both the correct site and patient are engaged in the surgical process. The performance model can be used to predict patient waiting time and service duration time with RFID implementation. A proof-of-concept system is developed to understand the information flow and to use information in RFID-based patient identification. Performance model indicates the response time to patients can be reduced to 38% after four hours using the proposed RFID based workflow.


2017 ◽  
Vol 8 (1) ◽  
pp. 42-52 ◽  
Author(s):  
Greg Gogolin ◽  
Erin Gogolin

The proliferation of mobile devices such as smart phones and other handheld appliances has stimulated the development of a broad range of functionality, including medical, retail, gaming, and personal applications. Technology that has been leveraged to enable many of these uses includes embedded mobile, radio frequency identification, location based services, and augmented reality. Embedded mobile refers to preprogrammed tasks that are performed on a mobile device. Personal care and monitoring is one of the most common uses of embedded mobile. RFID involves communication between a tag and a reader. Mobile RFID extends the technology by tagging the mobile device with an RFID tag to perform tasks on the device. Near field communication is frequently utilized in mobile payment systems. Advertisers find this of significant use in focusing advertisements based on the location of an individual. Augmented reality involves the use of computer generated or enhanced sensory input such as audio and visual components to enhance the perception of reality.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5460 ◽  
Author(s):  
Franck Kimetya Byondi ◽  
Youchung Chung

This paper presents a passive cavity type Ultra High Frequency (UHF) Radio Frequency Identification (RFID) tag antenna having the longest read-range, and compares it with existing long-range UHF RFID tag antenna. The study also demonstrates mathematically and experimentally that our proposed longest-range UHF RFID cavity type tag antenna has a longer read-range than existing passive tag antennas. Our tag antenna was designed with 140 × 60 × 10 mm3 size, and reached 26 m measured read-range and 36.3 m mathematically calculated read-range. This UHF tag antenna can be applied to metal and non-metal objects. By adding a further sensing capability, it can have a great benefit for the Internet of Things (IoT) and wireless sensor networks (WSN).


Sign in / Sign up

Export Citation Format

Share Document