Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol

被引:3
|
作者
Mujahid, Umar [1 ]
Jafri, Atif Raza [1 ]
Najam-ul-Islam, M. [1 ]
机构
[1] Bahria Univ, Dept Elect Engn, Islamabad Campus, Ict Capital, Pakistan
关键词
RFID; UMAP; FPGA; ASIC; security; ATTACK;
D O I
10.1142/S021812661650078X
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy are the two major concerns of radio-frequency identification (RFID) based identification systems. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs) to ensure the security of the low cost RFID tags in recent years. However, almost all of the previously proposed protocols have some serious security flaws and are vulnerable to various security attacks (full disclosure attack, desynchronization attack, impersonation attack, etc.). Recently, a more sophisticated and robust UMAP: Robust confidentiality integrity and authentication (RCIA)(1) [U. Mujahid, M. Najam-ul-Islam and M. Ali Shami, RCIA: A new ultralightweight RFID authentication protocol using recursive hash, Int. J. Distrib. Sens. Netw. 2015 (2015) 642180] has been proposed. A new ultralightweight primitive, "recursive hash" has been used extensively in the protocol design which provides hamming weight unpredictability and irreversibility to ensure optimal security. In addition to security and privacy, small chip area is another design constraint which is mandatory requirement for a protocol to be considered as ultralightweight authentication protocol. Keeping in view the scenario presented above, this paper presents the efficient hardware implementation of the RCIA for EPC-C1G2 tags. Both the FPGA and ASIC implementation flows have been adopted. The FPGA design flow is primarily used to validate the functionality of the proposed hardware design whereas ASIC design (using TSMC 0.35 mu m library) is used to validate the gate count. To the best of our knowledge, this is the first FPGA and ASIC implementation of any ultralightweight RFID authentication protocol. The simulation and synthesis results of the proposed optimal hardware architecture show the compatibility of the RCIA with extremely low cost RFID tags.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Efficient Hardware Implementation of KMAP plus : An Ultralightweight Mutual Authentication Protocol
    Mujahid, Umar
    Najam-ul-Islam, M.
    Khalid, Madiha
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (02)
  • [2] Hardware Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Yuan, Ching-Chien
    Chen, Ming-Kun
    Lin, Wei-Cheng
    Teng, Hsien-Chiao
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (05) : 1573 - 1582
  • [3] Efficient Ultralightweight RFID Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 102 - 108
  • [4] A New Ultralightweight RFID Protocol with Mutual Authentication
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P. -S.
    Chen, T. -C.
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 58 - +
  • [5] Efficient Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Li, Hung-Lin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) : 4784 - 4791
  • [6] An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication
    Jia, Qingxuan
    Wang, Xin
    Gao, Xin
    Gao, Panpan
    Zhao, Bing
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1966 - +
  • [7] Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains
    Sidorov, Michail
    Ong, Ming Tze
    Sridharan, Ravivarma Vikneswaren
    Nakamura, Junya
    Ohmura, Ren
    Khor, Jing Huey
    [J]. IEEE ACCESS, 2019, 7 : 7273 - 7285
  • [8] Hardware implementation of tag-reader mutual authentication protocol for RFID systems
    Vijaykumar, V. R.
    Elango, S.
    [J]. INTEGRATION-THE VLSI JOURNAL, 2014, 47 (01) : 123 - 129
  • [9] An Enhanced Ultralightweight RFID Authentication Protocol
    Yeh, Tzu-Chang
    Wu, Chia-Sheng
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 799 - 804
  • [10] Design and Implementation of RFID Mutual Authentication Protocol
    Li, Hung-Lin
    Yuan, Ching-Chien
    Yen, Chia-Hao
    Huang, Yu-Jung
    Lin, Wei-Cheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 229 - 232