Hardware Implementation of RFID Collaberal Affirmation Protocol
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 5
Abstract
Radio-frequency identification (RFID) is a free space technology which implements radio communication to identify objects with a specific electrical property. The great in extent deployment of RFID technologies may create new threats to security and user privacy. One of the main drawbacks of RFID technology is the feeble authentication systems between a reader and a tag. In general, “anemic” authentication systems that either divulge the keyword directly over the network or leak decent information while evolving the authentication to allow intruders to obtain or deduce or reckon the keyword. In this paper, we study the RFID tag-reader mutual authentication connives. A hardware implementation of the mutual authentication protocol for the RFID system is asserted. The proposed system was simulated using Modelsim XE II and synthesized using Xilinx synthesis technology. The system has been successfully implemented in hardware using an Altera DE2 board that included an Altera Cyclone II field-programmable gate array (FPGA). Finally, the output waveforms from the FPGA were displayed on the 32702A logic analysis system for real-time verification.
Authors and Affiliations
Murali Krishna Bathula, B. Ratna Raju, G. N. Swamy, K. Padma Raju
Image Edge Detection Using Improved Ant Colony Optimization Algorithm
Image processing is a method to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. Image edge detection is the one of...
Routing Scheme for Exploring Opportunities in Ad Hoc Networks
OPPORTUNISTIC routing for multihop wireless ad hoc networks has seen recent research interest to overcome deficiencies of conventional routing. The proposed scheme utilizes a reinforcement learning framework to oppo...
Intelligent Ambulance Rescue System
Traffic problems, congested traffic and flow management were recognized as major problems mostly in all the areas, which have caused problem for the ambulance which carries the emergency patient. Moreover road accide...
Improved Diversity with Limited Feed back for more than two users
We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...
Concealment safeguarding delegated access control in shared clouds
Cloud computing, as a developing computing standard. Cloud computing empowers clients to remotely store their information in a cloud furthermore profit by administrations on-interest. With fast improvement of Cloud c...