Documente Academic
Documente Profesional
Documente Cultură
April 2015
ISSN: 2393-9923
PG Scholar, Dept of Electronics and Communication Engineering, SIR C R Reddy College of engineering, Eluru, India
Assistant Professor, Dept of Electronics and Communication Engineering SIR C R Reddy College of engineering, Eluru, India
E-mail Id: prasadkollu425@gmail.com, miranji.katta@gmail.com
ABSTRACT: This paper presents the design and implementation of a complete near-field communication (NFC) tag
system that supports high-security features. With recent advancement in Radio Frequency Identification (RFID)
technology, in addition to reduction in cost of each unit, security has emerged as a major concern. Since an RFID tag has
limited resources like memory, power and processing capabilities. All components have been highly optimized to meet
the fierce requirements of passively powered RFID devices. This paper investigates some relevant RFID encryption
algorithms and their possible implementations with respect to security, cost and performance. A survey and brief
comparison of the algorithms are performed and the Modified Tiny Encryption Algorithm (MTEA) is selected as a
feasible solution for encryption and decryption with an acceptable level of security. The variable key scheme (MTEA) is
proposed which uses for RFID tag to overcome the security weakness of AES (128) and ECDSA algorithm against
attacks. In this paper implementation of variable key scheme (MTEA) RFID Tag using VHDL. Simulations corroborate
the functionality of the protocols and the two techniques are compared in terms of timing, cost, security and performance.
Potential improvements to enhance the security and strengthen RF communication during authentication are explored.
Keywords: 8-b microcontroller, advanced encryption standard (AES), elliptic curve cryptography near-field
communication(NFC), radio-frequency identification (RFID), VLSI design, MTEA, Variable key scheme crypto unit .
I. INTRODUCTION
Radio Frequency Identification (RFID) is a rapidly developing field and technology that emerged in the last decade this
technology is employed by using implantable microchip devices also known as RFID tags. Applications such as electronic
passports, logistics, animal identification, and car immobilizers already make use of this technology. A widely-used datatransmission standard based on RFID Technology is near-field communication. One of the best ways to provide security and
privacy measures is through an authentication process. Authentication is an assurance of the identity of an entity at the other
end of communication channel. There are various authentication schemes or protocols such as password Protection which is
an example of a weak authentication and strong authentication schemes such as those based on a challenge and response
concept. Many RFID authentication protocols use cryptographic techniques to protect messages exchanged over a radio
frequency interface from eavesdropping.
An RFID tag has limited features which include minimal memory resources and power capabilities. Transponders are
attached to a small antenna to transmit and receive radio waves and are equipped to operate in a wide range of frequencies
from low frequency (120 KHz) to ultra high frequency (960 MHz). They are usually classified as active and passive tags,
depending on their available resources. Active tags possess a battery and higher processing abilities as opposed to passive tags
which have very limited resources and no battery. A passive tag derives its power from the radio waves generated by the
reader during interrogation. Due to their restricted capabilities passive tags warrant encryption algorithms with minimal
computational complexity. In addition to the tag and the reader, the entire system comprises a backend server that is
employed to store all vital information including details of all tags being used. In difference to other published platforms with
similar characteristics [1, 2, 3], the Demo Tags are available for research purposes without any restrictions. They completely
implement the mandatory functionality of the communication standard. Therefore, the Demo Tags allow more flexibility for
selection of the reader platform for prototyping. In this paper, we present the design and implementation of a security-enabled
NFC tag with flexible architecture The CRYPTA tag (Cryptographic Protected Tags for new RFID Applications) operates at
a carrier frequency of 13.56 MHz and works fully passively. We target a low-area design that requires as little resources as
possible such that the tag production does not exceed the practical limits of a possible commercial launch. In this paper
proposed new crypto unit. This Crypto unit is variable key scheme by using modified tiny encryption algorithm (MTEA).The
MTEA algorithm is lightweight consuming minimal resource. The proposed RFID tag security is extended by using variable
key scheme crypto unit.
The remainder of this paper is organized as follows. Section II provides an overview of the CRYPTA tag and describes the
supported functionality. Detailed information about the tag architecture is given in Section III, Detailed information about
proposed variable key scheme crypto unit is given in section IV. The simulation outputs are in section V. Conclusions are
drawn in Section VI.
60
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
Fig. 3: FL Architecture
Incoming serial data from the analog front-end is first sampled by the RxTx unit, decoded into bits, transformed to byte data,
and checked for integrity (parity bits and CRC). Byte-level data coming from the control unit is appended with a checksum,
encoded, and then transmitted bit-by-bit to the analog front-end. The RxTx unit is also responsible for proper timing of the tag
response, which needs to be transmitted within certain time slots. The control unit steers the RxTx unit
as well as the AMBA interface and handles also the initialization and anti-collision phase of the tag (basic tag functionality).
When data coming from the microcontroller needs to be transmitted by the FL, it is first placed in the FIFO buffer and then
forwarded by the control unit to the RxTx unit.
For connecting the FL with the AMBA bus, the AMBA interface is used. Although the data width of the AMBA bus is 16 b,
only the lower 8 b is used by the FL, since it operates on byte level. The AMBA interface also contains a status register that
provides information about the internal state of the FL and a configuration register that allows the microcontroller to adjust
various parameters. Both registers can be accessed by the microcontroller via the AMBA bus. Besides the AMBA bus, some
additional direct signals are shared between FL and the microcontroller to speed up communication.
8-b Microcontroller
An overview of the microcontroller architecture is depicted in Fig.4. The design uses a Harvard architecture, which has the
advantage that data memory (8 b) and program memory (16 b) can have different word sizes. When the ALU performs
arithmetic and logical operations on a byte (8-bits) at an instruction, the microcontroller is an 8-bit microcontroller. The
internal bus width of 8-bit microcontroller is of 8-bit.
62
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
64
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
65
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
GJTE-Vol(2)-Issue(4)
April 2015
ISSN: 2393-9923
Mr.Miranji katta received the B.Tech degree in Electronics and communication from Jawaharlal Nehru
technological university, Hyderabad, India, in 2007, and the M.Tech degree in Embedded Systems from
Jawaharlal Nehru technological University, Kakinada, in 2011.His research interests include low-power
computing, real-time embedded systems, and operating systems.
67