Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Koramangala, Bengaluru-34
Department of
Electronics and Communication Engineering
Presented By:
ABHISHEK BHAVIKATTI 1VI16EC003
ANIL KUMAR N 1VI16EC013
G AMARA SIMHA REDDY 1VI16EC031
KOWSHIK H V 1VI16EC052
Departmnet of ECE 4
Literature Survey
1.Paper title: EPC Gen2v2 RFID Standard Authentication.
• Authors: S Jaganntham , Eyed Taqieddin
• Objective: In this paper Providing security in passive RFID
systems has gained significant attention due to their
widespread use was explained. The Research has focused on
providing both location and data privacy through mutual
authentication between the readers and tags.
Departmnet of ECE 5
Literature Survey
2. Paper title : A Novel Modulo 2 n -2 k -1 Adder for Residue
Number System
• Author : Shang Ma, Jian-Hao Hu, Member, IEEE, and Chen-
Hao Wang
• Objective:In this paper, a novel algorithm and its VLSI
implementation structure are proposed for modulo 2 n -2 k -1
adder. In the proposed algorithm, parallel prefix operation and
carry correction techniques are adopted to eliminate the re-
computation of carries. Any existing parallel prefix structure
can be used in the proposed structure. Thus, we can get
flexible tradeoff between area and delay with the proposed
structure. Compared with same type modular adder with
traditional structures, the proposed modulo 2 n -2 k -1 adder
offers better performance inDepartmnet
delay and area.
of ECE 6
Literature Survey
3. Paper title : Hardware Implementation of RFID Mutual
Authentication Protocol
• Authors: Yu-Jung Huang, Ching-Chien Yuan.
• Objective: In this paper, we studied about RFID tag–reader
mutual authentication scheme. A hardware implementation
of the mutual authentication protocol for the RFID system is
explained in this paper and also drawbacks were explained.
Departmnet of ECE 7
Literature Survey
• 4. Paper title : Efficient Implementation of RFID Mutual
Authentication Protocol
• Authors: Yu-Jung Huang, Senior Member, IEEE, Wei-Cheng
Lin, and Hung-Lin .Li.
• Objective: In this paper, we study the radio-frequency
identification (RFID) tag–reader mutual authentication
(TRMA)scheme. Two improved authentication protocols for
generating the PadGen function are described.
Departmnet of ECE 8
Problem Statement
• The term mutual authentication refers to authentication between
the both reader and tag for communication establishment.
• The proposed protocol architecture utilizes 32 bit password and
two 32 bit random numbers (each one generated by the tag and
the reader), for establishing the mutual authentication. The
random numbers and the password are processed by the proposed
encoder which uses 2 n -2 k -1 modulo adder for better security.
• In a RFID mutual authentication protocol, to establish the
communication between the tag and the reader an encoded
password is required. In general, the RFID communication starts
with the request signal sent by the reader. The reader always emits
the radio signal and whenever the tag enters into the range it
responds to the reader’s request.
Departmnet of ECE 9
Proposed Tag-Reader Mutual Authentication(TRMA) protocol
Departmnet of ECE 10
Notations and Symbols used in the proposed protocol
Department of ECE 11
Proposed TRMA protocol encoder architecture
Departmnet of ECE 12
Specifications
• Software Specifications :
Verilog hardware description language(HDL),Xilinx ISE 9.2i
or cadence tool used for simulation.
• Hardware Specifications:
Spartan 3 FPGA kit , RFID Tag and Reader.
Departmnet of ECE 13
Expected outcome of the project
• Experimental results of the proposed scheme gives better
performances in terms of area, power and delay when
compared with existing mutual authentication schemes.
• The proposed protocol consumes low power and occupies
less area hence it can be highly suitable for lightweight RFID
applications.
Departmnet of ECE 14
Applications
• In government libraries use barcode and electromagnetic
strips to pack various assets.
• In Shopping malls for billing purpose.
• Logistic and supply chain visibility.
• Attendee tracking.
• Toll gates (fastag).
Departmnet of ECE 15
Summary
• In this work, novel encoder architecture for RFID mutual
authentication protocol between the reader-tag with less area,
less power and minimum delay with better security is
proposed.
• The functionality of the proposed protocol is coded in
Verilog HDL and implemented in FPGA.
• The 2n -2k -1 modulo adder is used in order to achieve less
area and delay.
Departmnet of ECE 16
REFERENCE
[1] Dirk Henrici, RFID Security and Privacy-Concepts, Protocols and
Architecture, Lecture Notes in Electrical Engineering, Springer
International Edition. 2008, vol. 17.
[2] D. M. Konidala, Z. Kim, and K. Kim, “A simple and cost effective
RFID tag–reader mutual authentication scheme,” in Proc. Int. Conf.
RFID Sec, Jul. 2007.
[3] Shang Ma, Jaian-Hao Hu, and Chen-HaoWang, “A Novel Modulo 2n
– 2k -1 Adder for Residue Number System”, IEEE Transactions on
Circuits and Systems – I: Regular Papers, vol. 60, no. 11, pp.2962-
2972, Nov.2013.
[4] Frank Thornton, Brad Haines, Anand M. Das, et. al., RFID Security,
Syngress Publishing, Inc, 2006.
Departmnet of ECE 17
REFERENCE
[5] S. Piramuthu, “Protocols for RFID tag/reader authentication,” Decis.
Support Sys,., vol. 43, no. 3, pp. 897–914, Apr. 2007.
[6] M. Burrows, M. Abadi and R. Needham, “A Logic of
Authentication,” ACM Trans. Computer Systems, vol. 8, no. 1, pp. 18-
36, Feb. 1990.
[7] Dennis. E. Brown, RFID Implementations, McGraw Hill
Communications, Oct. 2006.
[8] H. Niu, E. Taqieddin and S. Jagannathan, “EPC Gen2v2 RFID
Standard Authentication and Ownership Management Protocol,”
Departmnet of ECE 18
Any Questions?
Departmnet of ECE 19
Thank You
Departmnet of ECE 20