Sei sulla pagina 1di 20

VEMANA INSTITUTE OF TECHNOLOGY

Koramangala, Bengaluru-34

Department of
Electronics and Communication Engineering

“IMPLEMENTATION OF 2n -2k -1 MODULO ADDER


BASED RFID MUTUAL AUTHENTICATION
PROTOCOL”

Presented By:
ABHISHEK BHAVIKATTI 1VI16EC003
ANIL KUMAR N 1VI16EC013
G AMARA SIMHA REDDY 1VI16EC031
KOWSHIK H V 1VI16EC052

Under the guidance of


Mr. VIVEKANANDA M R
Assistant Professor
Department of ECE
Departmnet of ECE 1
Contents
• Introduction
• Objective
• Literature Survey
• Problem Statement
• Design Methodology
• System Requirements
• Expected Outcome
• Applications
• Summary
• References
Departmnet of ECE 2
INTRODUCTION
• In wireless communication ,secure transmission and reception of data
are the major concern in day to days life.
• Radio Frequency Identification (RFID) plays a vital role in the security
system for secured data communication.
• This RFID system consists of three major sections: transponder (tag),
the interrogator (reader) and database.
• It utilizes one of the three general frequency bands:
• 125 kHz to 134 kHz (low frequency)
• 13.56 MHz (high frequency), and
• 860 MHz to 930 MHz (Ultra High Frequency)
• There are two categories of tags namely passive and active based on
the storage, specifications and applications..
• Passive tags do not need battery power because it acquires the power
from the reader’s electromagnetic request signals energy but the active
tags need a battery back-up Departmnet of ECE 3
Objective
• This project proposes new and efficient encoder architecture
for RFID mutual authentication protocol which utilizes 2n -
2 k -1 modulo adder for achieving higher security.
• The proposed architecture will be described in Verilog
Hardware Description Language (HDL) and the
functionalities can be verified using Xilinx ISE 9.2i.
• This architecture can be realized as hardware in FPGA and
real time and Spartan 3 is used as FPGA kit.

Departmnet of ECE 4
Literature Survey
1.Paper title: EPC Gen2v2 RFID Standard Authentication.
• Authors: S Jaganntham , Eyed Taqieddin
• Objective: In this paper Providing security in passive RFID
systems has gained significant attention due to their
widespread use was explained. The Research has focused on
providing both location and data privacy through mutual
authentication between the readers and tags.

Departmnet of ECE 5
Literature Survey
2. Paper title : A Novel Modulo 2 n -2 k -1 Adder for Residue
Number System
• Author : Shang Ma, Jian-Hao Hu, Member, IEEE, and Chen-
Hao Wang
• Objective:In this paper, a novel algorithm and its VLSI
implementation structure are proposed for modulo 2 n -2 k -1
adder. In the proposed algorithm, parallel prefix operation and
carry correction techniques are adopted to eliminate the re-
computation of carries. Any existing parallel prefix structure
can be used in the proposed structure. Thus, we can get
flexible tradeoff between area and delay with the proposed
structure. Compared with same type modular adder with
traditional structures, the proposed modulo 2 n -2 k -1 adder
offers better performance inDepartmnet
delay and area.
of ECE 6
Literature Survey
3. Paper title : Hardware Implementation of RFID Mutual
Authentication Protocol
• Authors: Yu-Jung Huang, Ching-Chien Yuan.
• Objective: In this paper, we studied about RFID tag–reader
mutual authentication scheme. A hardware implementation
of the mutual authentication protocol for the RFID system is
explained in this paper and also drawbacks were explained.

Departmnet of ECE 7
Literature Survey
• 4. Paper title : Efficient Implementation of RFID Mutual
Authentication Protocol
• Authors: Yu-Jung Huang, Senior Member, IEEE, Wei-Cheng
Lin, and Hung-Lin .Li.
• Objective: In this paper, we study the radio-frequency
identification (RFID) tag–reader mutual authentication
(TRMA)scheme. Two improved authentication protocols for
generating the PadGen function are described.

Departmnet of ECE 8
Problem Statement
• The term mutual authentication refers to authentication between
the both reader and tag for communication establishment.
• The proposed protocol architecture utilizes 32 bit password and
two 32 bit random numbers (each one generated by the tag and
the reader), for establishing the mutual authentication. The
random numbers and the password are processed by the proposed
encoder which uses 2 n -2 k -1 modulo adder for better security.
• In a RFID mutual authentication protocol, to establish the
communication between the tag and the reader an encoded
password is required. In general, the RFID communication starts
with the request signal sent by the reader. The reader always emits
the radio signal and whenever the tag enters into the range it
responds to the reader’s request.
Departmnet of ECE 9
Proposed Tag-Reader Mutual Authentication(TRMA) protocol

Departmnet of ECE 10
Notations and Symbols used in the proposed protocol

Department of ECE 11
Proposed TRMA protocol encoder architecture

Departmnet of ECE 12
Specifications
• Software Specifications :
Verilog hardware description language(HDL),Xilinx ISE 9.2i
or cadence tool used for simulation.
• Hardware Specifications:
Spartan 3 FPGA kit , RFID Tag and Reader.

Departmnet of ECE 13
Expected outcome of the project
• Experimental results of the proposed scheme gives better
performances in terms of area, power and delay when
compared with existing mutual authentication schemes.
• The proposed protocol consumes low power and occupies
less area hence it can be highly suitable for lightweight RFID
applications.

Departmnet of ECE 14
Applications
• In government libraries use barcode and electromagnetic
strips to pack various assets.
• In Shopping malls for billing purpose.
• Logistic and supply chain visibility.
• Attendee tracking.
• Toll gates (fastag).

Departmnet of ECE 15
Summary
• In this work, novel encoder architecture for RFID mutual
authentication protocol between the reader-tag with less area,
less power and minimum delay with better security is
proposed.
• The functionality of the proposed protocol is coded in
Verilog HDL and implemented in FPGA.
• The 2n -2k -1 modulo adder is used in order to achieve less
area and delay.

Departmnet of ECE 16
REFERENCE
[1] Dirk Henrici, RFID Security and Privacy-Concepts, Protocols and
Architecture, Lecture Notes in Electrical Engineering, Springer
International Edition. 2008, vol. 17.
[2] D. M. Konidala, Z. Kim, and K. Kim, “A simple and cost effective
RFID tag–reader mutual authentication scheme,” in Proc. Int. Conf.
RFID Sec, Jul. 2007.
[3] Shang Ma, Jaian-Hao Hu, and Chen-HaoWang, “A Novel Modulo 2n
– 2k -1 Adder for Residue Number System”, IEEE Transactions on
Circuits and Systems – I: Regular Papers, vol. 60, no. 11, pp.2962-
2972, Nov.2013.
[4] Frank Thornton, Brad Haines, Anand M. Das, et. al., RFID Security,
Syngress Publishing, Inc, 2006.

Departmnet of ECE 17
REFERENCE
[5] S. Piramuthu, “Protocols for RFID tag/reader authentication,” Decis.
Support Sys,., vol. 43, no. 3, pp. 897–914, Apr. 2007.
[6] M. Burrows, M. Abadi and R. Needham, “A Logic of
Authentication,” ACM Trans. Computer Systems, vol. 8, no. 1, pp. 18-
36, Feb. 1990.
[7] Dennis. E. Brown, RFID Implementations, McGraw Hill
Communications, Oct. 2006.
[8] H. Niu, E. Taqieddin and S. Jagannathan, “EPC Gen2v2 RFID
Standard Authentication and Ownership Management Protocol,”

Departmnet of ECE 18
Any Questions?

Departmnet of ECE 19
Thank You

Departmnet of ECE 20

Potrebbero piacerti anche