International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 Hardware Implementation of Secured Authentication Protocol for RFID System P. Thamarai, B.karthik, Bharath University Department of Electronics and Communication Abstract In general, during the authentication process of RFID tags the tag/reader/server communicates over an insecure channel due to “weak” authentication protocols. The Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification have some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication, that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed pad generation (Pad Gen) function is used to improve security. The Pad Gen function is used to produce a cover-coding pad to mask the tag's access password before the data transmission. Hence a mutual authentication protocol and this XOR scheme is proposed to avoid the data leakage and data traceability during the data transmission .This system model is simulated in Modelsim and synthesized using Xilinx ISE software. The performance of this authentication scheme will be verified in hardware using Spartan 3E FPGA. ISSN: 2231-5381 http://www.ijettjournal.org Page 25 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 1. Introduction 1.1Overview RADIO-FREQUENCY identification (RFID) is a contact-less identification technology that enables remote and automated gathering and sending of information between RFID tags or transponders and readers or interrogators using a wireless link. In recent years, RFID technology has gained a rapid acceptance as a means to identify and track a wide array of manufactured objects. It is composed of three main components: tag, reader and a back-end database. RFID tags come in a range of forms and can vary in storage capacity, memory type, radio frequency and power capability. Most of these tags contain only a unique Electronic Product Code(EPC) number and further information about the product is stored on a network of databases, called the EPC-Information Services(EPC-IS).Through the wireless interface, each tag can report data when queried over radio by an RFID reader. RFID readers can only recognize tags in proximity; a data tag that is out of range cannot be read by a reader. This distance limitation severely restricts RFID deployment. Despite equipping readers and tags with longer-range wireless communication capability, RFID readers still have difficulties in tracking or monitoring tags at a distance. 1.1.1 EPC GLOBAL CLASS-1 GENERATION-2 STANDARD RFID standards are major issues in securing high investments in RFID technology on different levels (e.g., interface protocols, data structure, etc.).The EPC global Class-1 Generation-2 (C1G2) ultra-high frequency (UHF) RFID standard defines a specification for passive RFID technology and is an open and global standard. The EPC C1G2 standard specifies the RFID communication protocol within the UHF spectrum (860 to 960MHZ).The standard specifies that a complaint RFID tag should contain a 32-b kill password (Kpwd) to permanently disable the tag and a 32-b access password (Apwd). The reader then performs a bitwise XOR of the data or password with a random number from the tag to cover-code data or a password in EPC Gen 2. 1.1.2 Components of an RFID System The RFID system consists of various components which are integrated. This allows the RFID system to deduct the objects (tag) and perform various operations on it. The integration of RFID components enables the implementation of an RFID solution. The RFID system consists of following five components Tag (attached with an object, unique identification). Reader (receiver of tag information, manipulator). ISSN: 2231-5381 http://www.ijettjournal.org Page 26 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 Communication infrastructure (enable reader/RFID to work through IT infrastructure). Application software (user database/application/ interface). 1.1.3Tags Tags contain microchips that store the unique identification (ID) of each object. The ID is a serial number stored in the RFID memory. The chip is made up of integrated circuit and embedded in a silicon chip. RFID memory chip can be permanent or changeable depending on the read/write characteristics. Read-only and rewrite circuits are different as read-only tag contain fixed data and cannot be changed without re-program electronically. On the other hand, re-write tags can be programmed through the reader at any time without any limit. There are three types of tags: the passive, semi-active and active. Semi-active tags have a combination of active and passive tags characteristics. So, mainly two types of tags (active and passive) are being used by industry and most of the RFID system. 1.1.4Antenna: RFID antennas collect data and are used as a medium for tag reading. Each RFID system includes at least one antenna to transmit and receive the RF signals. In some systems, a single antenna transmits and receives the signals, in other systems, one antenna transmits and one antenna receives the signals. The quantity and type of antennas used depend on the application. 1.1.5RF Transceiver: The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as a RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the backscatter signal from a passive RFID tag. 1.1.6Reader: RFID reader works as a central place for the RFID system. It reads tags data through the RFID antennas at a certain frequency. Basically, the reader is an electronic apparatus which produce and accept a radio signals. The antennas contains an attached reader, the reader translates the tags radio signals through antenna, depending on the tags capacity. The readers consist of a build-in anti-collision schemes and a single reader can operate on multiple frequencies. As a result, these readers are expected to collect or write data onto tag (in case) and pass to computer systems. For this purpose readers can be connected using RS-232, RS-485, ISSN: 2231-5381 http://www.ijettjournal.org Page 27 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 USB cable as a wired options (called serial readers) and connect to the computer system. Also can use WiFi as wireless options which also known as network readers. The RFID reader directs the RF transceiver to transmit RF signals, receives the encoded signal from the tag through the RF transceiver, decodes the tag's identification, and transmits the identification with any other data from the tag to the host computer. The reader may also provide other functions. 1.1.7RFID principles: Many types of RFID exist, but at the highest level, we can divide RFID devices INTO two classes: active and passive. Active tags require a power source—they're either connected to a powered infrastructure or use energy stored in an integrated battery. In the latter case, a tag's lifetime is limited by the stored energy, balanced against the number of read operations the device must undergo. One example of an active tag is the transponder attached to an aircraft that identifies its national origin. However, batteries make the cost, size, and lifetime of active tags impractical for the retail trade. Passive RFID is of interest because the tags don't require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label. A passive tag consists of three parts: an antenna, a semiconductor chip attached to the antenna, and some form of encapsulation. The tag reader is responsible for powering and communicating with a tag. The tag antenna captures energy and transfers the tag's ID (the tag's chip coordinates this process). The encapsulation maintains the tag's integrity and protects the antenna and chip from environmental conditions or reagents. The encapsulation could be a small glass vial or a laminar plastic substrate with adhesive on one side to enable easy attachment to goods. Reading collocated tags one commercial objective of RFID systems is to read, and charge for, all tagged goods in a standard supermarket shopping cart as it is pushed through an instrumented checkout aisle. Such a system would speed up the checkout process and reduce operational costs. Even if the RF reading environment for an RFID tag is ideal, it's still an engineering challenge to support multiple collocated tags. ISSN: 2231-5381 http://www.ijettjournal.org Page 28 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 2.RFID system TheRFID tag’s 32-bit Access password and 32-bit kill passwords in achieving tag–reader mutual authentication. Their scheme uses two rounds of PadGen to compute a cover-coding pad. The first round performs PadGen over the access password, while the second round performs PadGen over the kill password. The PadGen function is used to create the 16-b pads for “cover coding” the access password. 2.1 A detailed description of each step for RFID System 1. The reader issues a Req_RN command to the acknowledged tag. 2. The tag then generates two 16-b random numbers, namely, RT1 and RT2, and backscatters them with its EPC to the reader. The reader forwards these messages to the manufacturer. 3. The manufacturer matches the received EPC to retrieve the tag’s access password (Apwd) and kill password (Kpwd) from the back-end database. 4. The manufacturer then generates and stores two 16-b random numbers, namely, RM1 and RM2. The “cover-coded passwords” for the 16 MSBs (CCPwdM1) and the 16 LSBs (CCPwdL1) are computed by the PadGen function. 5. CCPwdM1, CCPwdL1, and EPC along with four 16-b random numbers, namely, RM1, RM2, RM3, and RM4, generated by the manufacturer are transmitted to the reader, which, in turn, forwards them to the tag for verification. 6. To authenticate the tag, the tag generates another two random numbers RT3 and RT4 along with the received RM3 and RM4 used to compute CCPwdM2 and CCPwdL2 with the PadGen (RTi,RMi) function for i = 3, 4. 7. CCPwdM2, CCPwdL2, and EPC along with two 16-b random numbers, namely, RT3 and RT4, are transmitted to the reader, which, in turn, forwards them to the manufacturer for verification. 2.2 SECURITY THREATS There are several threats associated with RFID technology. RFID is vulnerable to Clandestine scanning, Clandestine tracking, skimming, cloning and eavesdropping. 2.2.1Threat 1 ISSN: 2231-5381 http://www.ijettjournal.org Page 29 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 Malicious RFID Readers: An RFID tag always response with its EPC number to any querying RFID reader. Therefore a powerful malicious reader can illegally snoop upon the tags(attached to products) inside a container, warehouse, etc, leading to corporate espionage. Such readers can corrupt and modify the tag’s data. 2.2.2.Threat 2 RFID Tag Cloning: A malicious reader can easily scan and copy the data(e.g., EPC number) on a genuine tag and embed the same data on to a fake tag. This fake tag can be attached to a counterfeit product. This threat cannot be prevented by tamperproof tags. Even though a particular tag gives out a genuine EPC number, it must still be authenticated by the reader. 2.2.3.Threat 3 Insider Attack: The current ratified standard on EPC global Class 1 Gen 2 UHF RFID protocol describes only a one-way reader-to-tag authentication scheme.The manufacturer of the product can embed a unique 32bit Access Password (APwd) into the tag. Only a reader with the right APwd can communicate with the tag. This scheme is not secure and it does not provide detail on the secure distribution of the tags. APwd from the manufacturer of the product to the stakeholder’s RFID reader. Any disgruntled, or compromised employee, can easily obtain the APwd by eavesdropping on any one of the communication sessions between the product lifecycle. 2.2.4.Threat 4 Man-in-the-Middle Attack: To accommodate quick and speedy scanning of goods in large bulks, EPC global Class 1 Gen 2 UHF RFID tag’s exhibit outstanding far-field performance. Readers can query and communicate with these tags over a range of ten meters. Therefore, we can anticipate man-in-the-middle attack from powerful malicious readers.This attack can be mounted to eavesdrop on the communication channel between the tag and the reader and to capture a tag’s EPC number and its APwd. ISSN: 2231-5381 http://www.ijettjournal.org Page 30 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 3. XOR Scheme Today security is imperative in many network-based applications. When dealing with data transfer, it is crucial to determine whether the data that is being received has been corrupted. In this system, we propose an authentication protocol, which mutually authenticates readers and tags. It can resist man-in-the-middle attacks and reduce re-authentication overhead. The main advantage of our proposed scheme is that it does not require the implementation of any special cryptographic hash functions/keys within the tag. There is also no need for the tag and the reader to synchronize security keys/hash values. We propose to improve the existing one-way reader-to-tag authentication scheme. This scheme utilizes the tag’s 32-b access and kill password in achieving tag-reader mutual authentication scheme. It uses two rounds of PadGen to compute a cover-coding pad. The first round performs PadGen over the access password, while the second round performs PadGen over the kill password. The PadGen function is used to create the 16-b Pads for “covercoding” the access password. This scheme is also much more difficult for an adversary to recover the access password under the correlation attack or to forge successful authentication under the dictionary attack. 3.1 Padgen The PadGen function is the key function used to produce a cover-coding pad to mask the tag’s access password before transmission. The implementation of the PadGen function also requires the random number generator to produce RTxand RMx. 3.1.1Access Password An access password is required before data are exchanged between a reader and a single tag. The access password is a 32-b value stored in the tag’s reserved memory. If this password is set, then the reader has to have the valid password before the tag will engage in a secured data exchange. 3.1.2 Kill Password The access passwords can be used in activating kill commands to permanently shut down tags, as well as for accessing and relocking a tag’s memory. These passwords can be used in activating kill commands to permanently shut down tags, as well as for accessing and relocking a tag’s memory. 3.1.3 Multiplexer In electronics, a multiplexer or mux is a device that selects one of several analog or digital input signals and forwards the selected input into a single line. A multiplexer of 2n inputs has n select lines, which are used to select which input line to send to the output. ISSN: 2231-5381 http://www.ijettjournal.org Page 31 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 An electronic multiplexer makes it possible for several signals to share one device or resource. A multiplexer is often used with a complementary demultiplexer on the receiving end. Multiplexer are combinational logic switching devices that operate like a very fast acting multiple position rotary switch. They connect or control, multiple input lines called "channels" consisting of either 2, 4, 8 or 16 individual inputs, one at a time to an output. Then the job of a multiplexer is to allow multiple signals to share a single common output. Multiplexers are used as one method of reducing the number of logic gates required in a circuit or when a single data line is required to carry two or more different digital signals. Generally, multiplexers have an even number of data inputs, a number of "control" inputs that correspond with the number of data inputs and according to the binary condition of these control inputs, the appropriate data input is connected directly to the output. 3.1.4 PadGen function based on XORoperation: Step 1: RT ⊕RM = RT⊕M = dx1dx2dx3dx4 Step 2: Apwd-PadGen(RT,RT⊕M) =adt1adt2adt3adt4_adt1+16adt2+16adt3+16adt4+16×_adx1adx2adx3adx4_ adx1+16adx2+16adx3+16adx4+16 = dW1dW2dW3dW4 (base 10) Step 3: Kpwd-PadGen(RV ,RW) = kdV1kdV 2kdV 3kdV 4_kdV 1+16kdV 2+16kdV 3+16kdV 4+16× _kdW1kdW2kdW3kdW4×_kdW1+16kdW2+16kdW3+16kdW4+16 = hq1hq2hq3hq4 (base 16) = PAD1 Step 4: RV ⊕RW = RV ⊕RW = ds1ds2ds3ds4 Step 5: Kpwd-PadGen(RV ,RV ⊕W) = kdV1kdV 2kdV 3kdV 4_kdV 1+16kdV 2+16kdV 3+16kdV 4+16 × _kds1kds2kds3kds4×_kds1+16kds2+16kds3+16kds4+16 = hr1hr2hr3hr4 (base 16) = PAD2. ISSN: 2231-5381 http://www.ijettjournal.org Page 32 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 In each PAD function is computed based on one set of (RTx,RMx), which is transmitted in the open space. In contrast to the PadGenproposed by Konidala et al., the present proposed PAD function is computed based on one set of (RV ,RW), which is not transmitted openly. RV and RW are computed based on Apwd-PadGen(RTx,RMx) and Apwd-PadGen(RTx,RTx⊕RMx), respectively. PAD1 and PAD2 are then generated by Kpwd-PadGen(RV ,RW) and Kpwd-PadGen(RV ,RV ⊕RW), respectively. The RV and RW values were calculated within the tags and readers. Therefore, an adversary would not be able to correlate all the bits in ApwdM and ApwdL. 1. Apwd-PadGen(RTx,RMx)=dv1dv2dv3dv4=RV. RTx,RMx, and Apwd are selected as the inputs for PadGenoperation,and the calculation resultsRV by XOR-PadGen operation are stored in register forfurther manipulation. 2. Apwd-PadGen(RT,RT ⊕RM)=dw1dw2dw3dw4=RW.Through mux selection, RT , RT ⊕ RM, and Apwd arechosen as inputs for PadGen operation.The calculation result RW is stored in register for furthercomputation. 3. Kpwd-PadGen (RV,RW)=hq1hq2hq3hq4=PAD1. ThePAD1 can then be obtained by muxselecting RV, RW, and Kpwd as inputs for XOR-PadGenoperation. 4. Kpwd-PadGen(RV,RV ⊕RW)=hr1hr2hr3hr4=PAD2.Similarly, the PAD2 can then beobtained using RV , RV ⊕ RW, along with Kpwd forXOR-PadGen operation. ISSN: 2231-5381 http://www.ijettjournal.org Page 33 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 4. Results (i) Simulation Output for Padgen: Figure 5:Output Waveform For PadgenFuntion (ii) Simulation Output for XOR Scheme: Figure 6: Output Waveform for XOR Scheme ISSN: 2231-5381 http://www.ijettjournal.org Page 34 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 Inputs: Apwd_Access Password (32-bit) =abcd1234 Kpwd_Kill Password (32-bit) =1234abcd Rtx_Tag Random Number (16-bit) =abcd Rmx_Manufacturar Random Number (16-bit) =1234 Outputs: Pad1_Padgeneration 1 (16-bit) =3d52 Pad2_padgeneration 2 (16-bit) =d387 CcpwdM_Codecoverpassword MSB (16-bit) =969f CcpwdL_Codecoverpassword LSB (16-bit )=c1b3 ISSN: 2231-5381 http://www.ijettjournal.org Page 35 International Journal of Engineering Trends and Technology (IJETT) – Volume 3 Issue 1 No2 – February 2012 5. Conclusion To improve the security level of the original reader-to-tagauthentication protocol proposed under the EPC C1G2 specification,the PadGen functions are used to protect the Access passwordagainst exposure. The main advantage of the proposed schemeis that it does not require the implementation of any specialcryptographic hash functions/keys within the tag and a centerserver/database. There is also no need for the tag and the readerto synchronize security keys/hash values. The PadGen function was modified to strengthen the security of the mutual authentication scheme. The PadGen functions based on XOR operation and in association with the tag’s Apwd andKpwd are used to generate the PAD. The proposed protocol using the manipulated values within the tags and reader to enhance the PadGen operation is a more secure method for mutual authentication. 6. References [1] Yu-Jung Huang, Senior Member, IEEE, Wei-Cheng Lin, and Hung-Lin Li, “Efficient Implementation of RFID Mutual Authentication Protocol", ieee transactions on industrial electronics, vol. 59, no. 12, december 2012. [2] Y. J. Huang, C. C. Yuan, M. K. Chen, W. C. Lin, and H. C. Teng, “Hardware implementation of RFID mutual authentication protocol,” IEEE Trans. Ind. Electron., vol. 57, no. 5, pp. 1573–1582, May 2010.. [3] S. Piramuthu, “Lightweight cryptographic authentication in passive RFID-tagged systems,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.,vol. 38, no. 3, pp. 360–376, May 2008. [4] Hung-Yu-chien, “A New ultralightweight RFID Authntication Protocol Providing Strong Authentication and Strong Integrity” [5] A.Juels, “RFID security and privacy: A research survey,” IEEE J. Sel.AreasCommun., vol. 24, no. 2, pp. 381–394, Feb. 2006. ISSN: 2231-5381 http://www.ijettjournal.org Page 36