Hardware implementation of tag-reader mutual authentication protocol for RFID systems

被引:9
|
作者
Vijaykumar, V. R. [1 ]
Elango, S. [2 ]
机构
[1] Anna Univ, Dept Elect & Commun Engn, Coimbatore 641047, Tamil Nadu, India
[2] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Erode 638401, Tamil Nadu, India
关键词
Authentication protocol; Field programmable gate array; RFID; Linear feedback shift register; Truncated multiplier; MULTIPLIERS;
D O I
10.1016/j.vlsi.2013.03.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency identification (RFID) is a recent technology that utilizes radio frequencies to track the object by transmitting a signal with a unique serial identity. Generally, the drawbacks of RFID technology are high cost and authentication systems between a reader and a tag become weak. In this paper, we proposed a protocol for RFID tag-reader mutual authentication scheme which is hardware efficient and consumes less dynamic power. Truncated multipliers are implemented in RFID tag-reader mutual authentication protocol system due to reduction in hardware cost and dynamic power. Experimental evaluation reveals that the proposed protocol with truncated multipliers provides more security than the earlier schemes. The proposed protocol is described in VHDL and simulated using Altera Quartus II. The functional block is implemented as hardware using an Altera DE2 Cyclone II (EP2C35F672C6) Field-Programmable Gate Array (FPGA). (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:123 / 129
页数:7
相关论文
共 50 条
  • [1] An Efficient RFID Tag-Reader Mutual Authentication Scheme
    Zhang, Yansheng
    Li, Dancheng
    Zhu, Zhiliang
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2942 - 2945
  • [2] A Novel Lightweight and Low Power Tag-Reader Mutual Authentication Protocol for Portable RFID based Security Systems
    Vijaykumar, V. R.
    Reghunath, Roshna
    Rajasekar, S.
    Elango, S.
    [J]. 2016 IEEE INDUSTRIAL ELECTRONICS AND APPLICATIONS CONFERENCE (IEACON), 2016, : 360 - 365
  • [3] Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
    Lim, T. L.
    Li, Tieyan
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 59 - 63
  • [4] Hardware Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Yuan, Ching-Chien
    Chen, Ming-Kun
    Lin, Wei-Cheng
    Teng, Hsien-Chiao
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (05) : 1573 - 1582
  • [5] Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol
    Mujahid, Umar
    Jafri, Atif Raza
    Najam-ul-Islam, M.
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (07)
  • [6] Kallima: A tag-reader protocol for privacy enhanced RFID system
    Doi, Y
    Wakayama, S
    Ishiyama, M
    Ozaki, S
    Inoue, A
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 375 - 382
  • [7] Ultralightweight RFID Reader-Tag Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 613 - 616
  • [8] Ultralightweight RFID Reader-Tag Mutual Authentication Revisited
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. 2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 166 - 173
  • [9] Efficient Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Li, Hung-Lin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) : 4784 - 4791
  • [10] Design and Implementation of RFID Mutual Authentication Protocol
    Li, Hung-Lin
    Yuan, Ching-Chien
    Yen, Chia-Hao
    Huang, Yu-Jung
    Lin, Wei-Cheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 229 - 232