CFP last date
20 December 2024
Reseach Article

Bit Shuffling Query Tree Algorithm for Secure Communication in RFID Network

by Nivedita Das, Indrajit Bhattacharya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 10
Year of Publication: 2012
Authors: Nivedita Das, Indrajit Bhattacharya
10.5120/7664-0775

Nivedita Das, Indrajit Bhattacharya . Bit Shuffling Query Tree Algorithm for Secure Communication in RFID Network. International Journal of Computer Applications. 49, 10 ( July 2012), 29-35. DOI=10.5120/7664-0775

@article{ 10.5120/7664-0775,
author = { Nivedita Das, Indrajit Bhattacharya },
title = { Bit Shuffling Query Tree Algorithm for Secure Communication in RFID Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 10 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number10/7664-0775/ },
doi = { 10.5120/7664-0775 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:56.419128+05:30
%A Nivedita Das
%A Indrajit Bhattacharya
%T Bit Shuffling Query Tree Algorithm for Secure Communication in RFID Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 10
%P 29-35
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

RFID uses radio frequency waves to track and identify objects. RFID system consists of tags and readers. Passive RFID tags are more popular now days due to its simpler circuitry, lower weight and lower cost. Generally passive tags are attached with an object for unique identification. A tag contains information about the particular product, to which it is attached. RFID reader is used to interrogate the tag to get the identity of the product attached with. RFID has numerous applications such as inventory management, asset tracking, library management etc. One of the major problems with RFID system is that whenever a reader interrogates a tag, all the tags residing in the read zone of the reader responds to the reader, which results in a collision at the reader's side. Thus makes it impossible to read the tags in time. To minimize the problem of collision at the reader side several anti collision algorithms has been proposed, but none of the algorithm concerns about the security aspect. Security is another major problem of RFID system. RFID tag discloses its identity to any reader which interrogates the tag, so any illegitimate reader can obtain the information contained in the tag. Now a day's situation is much worse because not only unique identification number but also user information such as name, address, phone number and other relevant information's of consumer are stored in the tag. There are different manufacturers of tags who provide tags with 1kb memory, which is large enough to store such kind of consumer information without pointing to backend database. In such cases security concern is much more as eavesdropping may lead to disclose some personal data, which is a big threat for consumer. Implementing cryptographic algorithm is not a feasible solution for the RFID system, as this may result in complex circuitry, and which in turn may raise size and cost of the passive tags. Here in this paper we have combined both the problem of collision and security together to find a suitable solution which solves both the problems. Taking into consideration of simpler circuitry and lower price of passive tags, here we propose a solution which modifies existing anti collision protocol to make it secure so that any illegitimate reader cannot read the information contained in the tag thus protecting tags from malicious reading.

References
  1. B. Glover, & H. Bhatt, O'Reilly Media, Inc, Sebastopol, (2006), ISBN 0-596-00944-5.
  2. Okkyeong Bang (ICU), Ji Hwan Choi (ICU), Dongwook Lee (ICU), Hyuckjae Lee (ICU), Efficient Novel Anti Collision Protocols for Passive RFID Tags, Auto-ID Labs White Paper WP-HARDWARE-050, March 2009.
  3. Ari Juels,Ronald L Rivest, Michael Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy.
  4. Vinod Namboodiri, Lixin Gao, Energy-Aware Tag Anti-Collision Protocols for RFID Systems.
  5. S. E. Sarma, S. A. Weis, D. W. Engels, Radio-frequency identification systems. In Burton S. Kaliski Jr. , C¸ etin Kaya Ko¸c, and Christof Paar, editors, CHES '02, pages 454–469. Springer-Verlag, 2002. LNCS no. 2523.
  6. S. E. Sarma, S. A. Weis, and D. W. Engels. RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002.
  7. S. E. Sarma, S. A. Weis, and D. W. Engels. Radio-frequency-identification security risks and challenges. CryptoBytes, 6(1), 2003.
  8. Benetton undecided on use of 'smart tags'. Associated Press, 8 April 2003.
  9. R. Shim. Benetton to track clothing with ID chips. CNET, 11 March 2003.
  10. S. Garfinkel. An RFID Bill of Rights. Technology Review, page 35, October 2002.
  11. D. McCullagh. RFID tags: Big Brother in small packages. CNet, 13 January 2003.
  12. S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In First International Conference on Security in Pervasive Computing, 2003.
  13. S. A. Weis. Radio-frequency identification security and privacy. Master's thesis, M. I. T. June 2003.
  14. A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In R. Wright, editor, Financial Cryptography '03. Springer-Verlag, 2003.
  15. mCloak: Personal / corporate management of wireless devices and technology, 2003. Product description at www. mobilecloak. com.
Index Terms

Computer Science
Information Sciences

Keywords

Secure anti collision protocol Secure Tree based algorithm