Rfid Based Device Control and Authentication
Rfid Based Device Control and Authentication
Rfid Based Device Control and Authentication
Submitted By:
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
INTRODUCTION
The main objective of this project is to provide security in an
organization by allowing only the authorized personnel to access
the secure area. The security of any organization is a priority for
the
authorities.
The
concern
is
for
the physical property and also for the intellectual property. For t
his reason only the authorized person with a valid RFID tag is
allowed into the secured premises. This
tag contains an
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
AUTHORIZED else states UNAUTHORIZED and doesnt
allow access. This project can be further enhanced by interfacing
it with GSM technology. Any attempt for unauthorized access
can be intimated to the security personnel through an SMS.
AS Low-cost computing devices become more pervasive,
counterfeiting may become a more serious security threat. For
example, the security of access control or payment systems will
rely on the authenticity of low-cost devices. Yet in many
settings, low-cost pervasive devices lack the resources to
implement standard cryptographic authentication protocols.
Low-cost Radio Frequency Identication (RFID) tags exemplify
such resource-constrained devices. Viewing them as possible
beneciaries of our work, we use RFID tags as a basis for our
discussions of the issues surrounding low-cost authentication.
Low-cost RFID tags in the form of Electronic Product Codes
(EPC) are poised to become the most pervasive device in history
. Already, there are billions of RFID tags on the market, used for
applications
like
supply-chain
management,
inventory
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
found on most consumer items), EPC tags are likely one day to
be axed to everyday consumer products.
Todays generation of basic EPC tags lack the computational
resources for strong cryptographic authentication. These tags
may only devote hundreds of gates to security operations.
Typically, EPC tags will passively harvest power from radio
signals emitted by tag readers. This means they have no internal
clock, nor can perform any operations independent of a reader.
In principle, standard cryptographic algorithms asymmetric or
symmetric can support authentication protocols. But
implementing an asymmetric cryptosystem like RSA in EPC
tags is entirely infeasible. RSA implementations require tens of
thousands of gate equivalents. Even the storage for RSA keys
would dwarf the memory available on most EPC tags. Standard
symmetric encryption algorithms, like DES or AES, are also too
costly for EPC tags. While current EPC tags may have at most
2,000 gate equivalents available for security (and generally
much less), common DES implementations require tens of
thousands of gates.
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
implementations require approximately 5,000 gates [11], this is
still too expensive for todays EPC tags.
It is easy to brush aside consideration of these resource
constraints. One might assume that Moores Law will eventually
enable RFID tags and similar devices to implement standard
cryptographic primitives like AES. But there is a countervailing
force: Many in the RFID industry believe that pricing pressure
and the spread of RFID tags into ever more cost-competitive
domains will mean little eective change in tag resources for
some time to come, and thus a pressing need for new lightweight
primitives.
HARDWARE USED
1.
89S52 Microcontroller
2.
3.
Diode IN4007
4.
RFID Module.
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
5.
SOFTWARE USED
Keil u-Vision 3.0
Keil
Software
is
used
provide
you
with
software
virtually
every
8051
derivative.
The
supported
AN INTRODUCTION TO 8051
MICROCONTROLLER:
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
Also called a "computer on a chip," billions of microcontroller units
(MCUs) are embedded each year in a myriad of products from toys to
appliances to automobiles. For example, a single vehicle can use 70 or
more microcontrollers. The following picture describes a general block
diagram of microcontroller.
INTRODUCTION TO RFID
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
What is RFID?
A basic RFID system consists of three components:
a) An antenna or coil
b) A transceiver (with decoder)
c) A transponder (RF tag)
These frequency ranges mostly tell the RF ranges of the tags from low
frequency tag ranging from 3m to 5m, mid-frequency ranging from 5m
RFID
BASED DEVICE CONTROL AND AUTHENTICATION
RFID BASED TOLL TAXRFID BASED BANKING
to 17m and high frequency ranging from 5ft to 90ft. The cost of the
system is based according to their ranges with low-frequency system
ranging from a few hundred dollars to a high-frequency system ranging
somewhere near 5000 dollars.
RFID
BASED
DEVICE
AND AUTHENTICATION
RFID
BASED
TOLL CONTROL
TAXRFID BASED
BANKING
RFID TAG
RFID READER
LCD
DISPLAY