SECURE SYMMETRIC AUTHENTICATION FOR RFID TAGS
Abstrat
The growing use of Radio Frequency Identiication (RFID) technology to enhance
Ubiquitous computing environments has only begun to be realized. It allows for the identification of
objects andlor subjects remotely using ettached RFID tags via a radio frequency channel, hence
identification is achieved in @ contact less manner. The advantages of using RFID technology is
growing tremendously and is gaining much attention as is seen by an increase in its deployment,
such as object tracking and monitoring, supply-chain management, and personalized information
services. Numerous authentication protocols for RFID systems were proposed in an attempt to
prevent unauthorized tracking and monitoring, impersonation or cloning, and information leakage.
Many of these attempts fail to enforce anonymity and order only weak authentication and some fail
under denial of service.
With a small introduction to RFID tags this paper enhances passive RFID (Radio
Frequency Identification) tags with cryptographically secure authentication. Starling with a short
introduction into common RFIO systems, we present a motivation why secure authentication with
standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We
demonstrate vulnerabilities of current RFID. systems and explain how application of an
authentication mechanisin can solve them. Furthermore we explain how authentication protocols
work and how they can be included in the RFID protocol standard ISO 18000. By presenting the
interim resuts of ART. we will show that the proposed enhancement is feasible with current RIFD
infrastructure and silicon technology used for RFID tags
Key Words: Radio Frequency, Monitoring, Rfid Tags, Authentication
Conclusion: in this paper we started with a short introduction to current RFID systems. We
showed how the basic principles work and we motivated the enhancement of actual RFID systems
with authentication functionalty with standardized methods and algorithms. The main resull so far
is that we showed, that secure symmetric authentication is feasible for current RFID technology
without significant adcitional costs. RFID with authentication is not only necessary to use RFID
technology in security relevant applications but aso i the tags contain personal data,
Its important to realize that there will be no universally “Right” solution even for similar
application with inthe same industry Every RFID solution each company adopts will be
unique.INTRODUCTION
Radio Frequency Identification (RFID) is an emerging technology. The main idea behind
itis to attach a so called RFID tag to every object in a particular environment and give a digital
identity fo all these objects. An RFID system is an small portable computer without a screen
and a keyboard thal interacts with the world through radio frequency signals. An RFID tagis a
small microchip, with an antenna, holding a unique ID and other information which can be sent
over radio frequency. The information can be automatically read and registered by RFID readers,
The data received by the RFID reader can be subsequently processed by a back-end database.
RFID SYSTEM
The tag contains a transponder with @ digital memory chip that is given @ unique
electronic product code. The interrogator, an antenna packaged with a transceiver and decoder,
‘emits a signal activating the RFID tag so it can read and write data to it, When an RFID tag passes
through the electromagnetic zone, it detects the reader's activation signal, The reader decodes the
data encoded in the tag's integrated crcuit (silicon chip) and the data is passed to the hast
‘computer. The application software on the host processes the data, often employing Physical
Markup Language(PML)
‘basic RFID system consist of three components:
4, An antenna or coil
2.A transceiver (with decoder)
3.A transponder (RF tag) electronically programmed with unique information
Figwe 1 gives a graphical overview of an RFID system
Ar tntertace
DE BO(s
‘on
rt
Figure 1: Overview of en RFID system.
The antenna emits radio signals to activate the tag and read and write data to it Antennas are the
conduits between the tag and the transceiver, which controls the system's data acquisition and
communication. Antennas are available in a variety of shapes and sizes, they can be built info @
door frame to receive tag data from persons or things passing through the door, or mounted on an
interstate toll booth to monitor traffic passing by on a freeway. The electromagnetic field produced
by an antenna can be constantly present when multiple tags are expected continually. If constant
interrogation is not requited, the field can be activated by a sensor device,
Often the antenna is packaged with the transceiver and decoder to become a reader (aka.
interrogator), which can be configured either as a handheld or a fixed-mount device. The reader
emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its
power output and the radio frequency used. When an RFID tag passes through the
electromagnetic zone, it detects the reader's activation signal, The reader decodes the data
encoded in the tag’s integrated circuit (silicon chip) and the deta is passed to the host computer for
processing,TYPES OF RFID TAGS
The RFID tags are again classified into three types. They are.
1 Active
2.Semi passive(=semi active)
3Passive
Passive RFID tags have no internal power supply. The minute electrical current induced in the
antenna by the incoming radio frequency signal provides just enough power for the CMOS
inlegrated circuit (IC) in the tag to power up and transmit a response. Most passive tags signal by
backscattering the carrier signal from the reader. This means that the aerial (antenna) has to be
designed to both collect power from the incoming signal and also to transmit the outbound
backscatter signal The response of a passive RFID tag is not just an ID number (GUID): tag chip
can contain nonvolatile EEPROM(Electiically Erasable Programmable Read-Only Memory) for
storing data. Lack of an onboard power supply means that the device can be quite small
commercially available products exist that can be embedded under the skin. The smallest such
devices commercially available measured 0.4 mm x 0.4 mm, and is thinner than a sheet of paper;
such devices are practically invisble. Passive tags have practical read distances ranging from
about 2 mm (|SO 14443) up to about few metres(ISO 18000-6) depending on the chosen radio
frequency. Due to their simplicity in design they are also suitable for manufacture with a printing
process for the antennae, A development target are polycarbon semiconductor tags to become
entirely printed. Passive RFID tags do not require batteries, and can be much smaller and have an
unlimited lfe span.
Semi-passive RFID tags are very similar to passive tags except for the addition of a small
battery. This battery allows the tag IC to be constantly powered. This removes the need for the
aerial to be designed to collect power from the incoming signal. Aerials can therefore be optimised
for the backscaltering signal. Semi-passive RFID tags are faster in response and therefore
stronger in reading ratio compared to passive tags.
Active RFID tags or beacons, on the other hand, have their own internal power source which
is used to power any ICs and generate the outgoing signal. They may have longer range and larger
memories than passive tags, as well as the abil to store addtional information sent by the
transceiver. To economize power consumption, many beacon concepts operate at fixed intervals,
‘At present, the smallest active tags are about the size of a coin. Many active tags have practical
ranges of tens of metres, and a battery life of up to 10 years. Because passive tags are cheaper to
manufacture and have no battery, the majority of RFID tags in existence are of the passive
variely These tags cost an average of Euro 0.20 at high volumes. Today, as universal RFID
tagging of individual products become commercially viable at very large volumes, the lowest cost
tags available on the market are as low as 7.2 cents each in volumes of 10 milion units or more,
Current demand for RFID integrated circuit chips is expected to grow rapidly based on these
prices. There are four main frequency bands for RFID tags commonly in use. They are categorized
by their radio frequency: low frequency tags (125 or 134.2 kHz), high frequency tags (13.66 MHZ),
UHF tags (868 fo 956 MHz) or 463 MHz, and microwave tags (2.45 GHz or 6.8 GHz). UHF tags
can be used globally when specially tailored according to regional regulations as there are no
globally unified regulations for radio frequencies in this ISM band range. There is a wide variation
of transponder devices and contactless chip cards which deliver similar functions.