Implementation Of Security Within GEN2 Protocol

ResearchCommons/Manakin Repository

Implementation Of Security Within GEN2 Protocol

Show full item record

Title: Implementation Of Security Within GEN2 Protocol
Author: Jagannatha, Shesh Kumar
Abstract: In this thesis, I propose and evaluate several methods to integrate security within the identification process and memory access processes of the ISO 18000-6C (or GEN2) passive UHF radio frequency identification (RFID) protocol. The RFID Tags are promiscuous and they emit their unique identifiers in clear upon interrogation from the Reader. They do not have a mutual authentication process to validate the Readers and Tags, this allows eavesdropping, illicit reading from a malicious Reader and counterfeit Tags. GEN2 Tags are being integrated into driver's licenses and being used for border crossing identities; thus, there is a need to secure both the identification process and memory access. To mitigate these threats, I integrate the strong cryptographic ciphers AES, PRESENT and XTEA into the GEN2 protocol and investigate their properties in secure identification and mutual authentication process. The mutual authentication protocol also enables a secure communication channel for the Readers and the Tags to communicate.An FPGA implementation of the GEN2 protocol integrated with the ciphers are done using VHDL and a comparison is made in terms of area, speed and power consumption. The simulation results show that integration of PRESENT and XTEA within GEN2 allows faster operation as compared to AES. PRESENT occupies the least hardware resources and has lower power consumption compared to AES and XTEA. The GEN2 protocol can be secured with strong cryptographic ciphers with minimal impact on identification rate and memory access.
Date: 2010-07-19

Files in this item

Files Size Format View
Jagannatha_uta_2502M_10682.pdf 2.342Mb PDF View/Open

This item appears in the following Collection(s)

Show full item record


My Account


About Us