ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

RFID Guardian: A Mobile Device For RFID Privacy Location-Aware

Anu. K, Jagan .S
Department of Computer Science and Engineering, G.K.M College of Engineering and Technology, Chennai, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

A new approach for enhancing security and privacy in certain RFID applications where by location. On the tag side, are designs a location-aware selective unlocking mechanism using which tags can selectively respond to reader interrogations rather than doing so promiscuously. On the server side, are design a locationaware secure transaction verification scheme that allows a bank server to decide whether to approve or deny a payment transaction. One Advantage is that there is no external user involvement.

Index Terms

RFID, RFID reader, Relay attack, Location sensing.

INTRODUCTION

Radio frequency identification (RFID) is a rapidly growing technology that has the potential to make great economic impacts on many industries. At its most basic, RFID systems consist of small transponders, or tags, attached to physical objects. RFID tags may soon
become the most pervasive microchip in history. A Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The two major problems faced by organizations are time consuming manual attendance and wastage of electrical power. Our project is going to solve these problems by using RFID technology. A typical RFID system consists of tags, readers, and/or back-end servers. Tags are miniaturized wireless radio devices that store information about their corresponding subject. This renders sensitive tag information easily subject to unauthorized reading. Information (might simply be a plain identifier) gleaned from a RFID tag can be used to track the owner of the tag. Consequently, solutions designed for RFID systems need to satisfy the requirements of the underlying RFID applications in terms of not only efficiency and security, but also usability.

PROBLEM DEFINITION

The system having lack of security due to its leakage of confidential information such as username, password and also entire details about the particular authorized user. If this information is easily hacked by the attacker by choosing the random possibilities of username and password and this will lead to the inconvenience of the authorized user. A large number of these threats are due to the tag’s promiscuous response to any reader requests. This renders sensitive tag information easily subject to unauthorized reading.A primary RFID security concern is the illicit tracking of RFID tags.

SYSTEM ARCHITECTURE

image

TECHNICAL DESCRIPTION

SELECTIVE UNLOCKING

In this Technique the tags can selectively respond to reader interrogations rather than responding promiscuously to queries from any readers, a tag can utilize location information and will only communicate when it makes sense to do so, thus, raising the bar even for sophisticated adversaries without affecting the RFID usage model.

TRANSACTION VERIFICATION

This Technique is used to find the location information. This is based on a straightforward observation that, under normal scenarios, both the legitimate tag and legitimate reader are in close physical proximity, at roughly the same location.

CONCLUSION

RFID are basedon a current technological advancement that enables many RFID tags with lowcost sensing capabilities. The payment card stores card details such as the credit card number, name of the owner, andexpiration date. It also stores a symmetric key shared with its issuer bank. To demonstrate the feasibility of our location-aware defense mechanisms, integrated a low-cost GPS receiver with a RFID tag (the Intel’s WISP) and conducted relevant experiments to acquire location and speed information from GSM.

References

  1. “A Survey Of Context-Aware Mobile Computing Research”Guanling Chen and David KotzDepartment of Computer ScienceDartmouth College Dartmouth Computer Science Technical Report TR2000-381 2000.
  2. “Monitoring Body Positions And Movements During Sleep Using WISPs”EnamulHoque, Robert F. Dickerson Department of Computer Science University of Virginia 2010.
  3. “Place-Its: A Study Of Location-Based Reminder On Mobile Phones”Timothy Sohn1, Kevin A. Li1, Gunny Lee1, Ian
  4. Smith2, James Scott3, andWilliam G. Griswold 2005.
  5. “Relay Attacks On Passive Keyless Entry And Start Systems In Modern Cars”Aur´elienFrancillon, Boris Danev, SrdjanCapkun Department of Computer ScienceETH Zurich8092 Zurich, Switzerland 2011.
  6. “Usability Of Display-Equipped Rfid Tags For Security Purposes”Alfred Kobsa1, Rishab Nithyanand2, Gene Tsudik1, and Ersin Uzun3 2011.
  7. “RfidsAnd Secret Handshakes: Defending Against Ghost-And-Leech Attacks And Unauthorized Reads With Context-
  8. Aware Communications”Alexei CzeskisUniversity of Washington 2008.
  9. “Exploring The Behavioural Effect Of Location Awareness Within The Social Context Of Rendezvousing”DavidDearman and KirstieHawkeyFaculty of Computer Science, Dalhousie University Halifax, NS B3H 1W5 2005.
  10. “Recognizing Daily Activities WithRfid-Based Sensors”Michael Buettner, Richa PrasadUniversity of Washington Seattle, USA 2006.
  11. “EpcRfid Tag Security Weaknesses And Defenses:Passport Cards, Enhanced Drivers Licenses And Beyond”Karl KoscherUniversity of Washington Seattle, Washington, USA 2009.
  12. “Readers Behaving Badly Reader Revocation InPki- Based Rfid Systems”RishabNithyanand, Gene Tsudik, and ErsinUzun 2010.