Fill This Form To Receive Instant Help

Help in Homework

RFID Tag Authentication without Internet Connection

  • Words: 1515

Published: Jun 01, 2024

The internet of things (IoT) has resulted in various technological transformations. The internet of things is based on any object being equipped with the relevant technology to perform various computing functions (Bendavid et al., 2018) . The internet of things is widely applicable and is moving from experimentation to practical application in the business world. Radio- frequency identification (RFID) is an important aspect of the internet of things. RFID relies on the use of electromagnetic fields to follow up on tags attached to different objects. RFID systems rely on the use of tags. The tags are attached to the objects of interest. RFID tags are created to be either passive or active. Active tags rely on an onboard battery that is used in the transmission of signals. On the other hand, a passive tag does not incorporate the use of a battery (Lee & Chien, 2015). It is preferred since it is cheaper compared to an active tag (. A passive tag relies on the use of radio energy that originates from the reader. Operation of a passive tag requires a power level that is strong to guarantee signal transmission.

One of the methods of authenticating RFID tags without internet connections is the use of Physical Unclonable Function (PUF). The aim of the method is to increase security and ensure that unauthorized access is denied. The PUF technology has, however, been proposed owing to the fact that it is more secure compared to other options. PUF technology is proposed due to the cost-effective nature of the strategy. The PUF-based authentication protocol constitutes of several distinct stages. The four stages include registration, mutual verification, tag verification, and update process (Bendavid et al., 2018). In the first stage, the reader instates the process by sending a search request. The reader also receives the tag’s response. In the second phase, the reader generates and a random number. In the authentication phase, both the tag and the reader are mutually authenticated.

In vehicle access tracking systems, RFID systems rely on authentication to stop vehicle theft. It is difficult to check vehicles manually, and this poses a problem that can be addressed through the Internet of things (Srivastava et al., 2015). Vehicles are attached to license plate identification through an RFID tag. During the time when the vehicle is entering the gate, the IR sensor becomes active. The activation of the IR sensor results in the whole system becoming activated. At the checkpoint, the information at the tag is read by the RFID reader (Cho et al., 2015). For the vehicle to be authorized, the license number has to be read. A match of the information from the tag and the vehicle’s registration number results in the car being allowed to pass.

The Raspberry Pi is a series of small single-board computers whose size can be compared to that of a credit card. It deals with different components such as Egoman, RS Components, and Newark element14. For long term storage and booting purposes, the design relays on a micro SD card instead of a hardware design. It makes use of various programming tools such as Linux, python. Raspberry Pi is bundled with Bluetooth, on-board wifi, and USB boot abilities. It uses ‘python’ as its default language, which is a widely used high-level programming language (Benítez, 2017).

The process begins with the installation of a smart rationing system, which interfaces RFID card and reader, fingerprint scanner, website, database, and raspberry pi. It consists of a fingerprint sensor, which the fingerprint of an individual is scanned. If the fingerprint matches the information in the database, then the RFID card is scanned through its reader. Each card contains a unique code. Every individual whose details are in the database is given a unique number, which is identified by the RFID reader after the card is scanned (Warke et al., 2018). A raspberry pi acts as the main controller. It takes the unique number from the RFID reader and uses it to access corresponding information or records in the database, which it then sends to the server. It displays that the individual is valid if the RFID card unique code matches the information stored in the database. When controlling raspberry pi over the internet, the safest and most convenient way is using cloud connections.

The RFID tag is used for authentication purposes, while the Raspberry Pi is used as the microcontroller. The RFID reader connects any microcontroller UART directly with an RS232 converter to PC (Kanvitha, Sirisha, & Chowdary, 2017). It can function properly with any 125 KHz RFID tags. Using the Raspberry Pi, and through the use of any programming tools such as Linux, Python, the USB based webcam can be turned up into a fully functional IP web. An RFID reader reads the values on tags and feeds them on the Raspberry Pi processor. For example, RFID Tag details of a theft vehicle can be entered from any browser which in turn gives Raspberry pi the details as an input (Priyanka, 2017). Then the raspberry pi compares the RFID tag details that are already stored with the dynamic details. In the event that the details match, then raspberry pi takes the snapshot of the vehicle and sends the details to the particular mail ID. The Camera is usually interfaced to the raspberry pi processor, which stores the image data in SD card.

References

  • Bendavid, Y., Bagheri, N., Safkhani, M., & Rostampour, S. (2018). IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”. Sensors, 18(12), 4444.
  • Benítez, M. F. P., (2017). Raspberry Pi for Biometrics and Security Applications., Journal of Engineering Research and Application ISSN: 2248-9622, Vol. 7, Issue 8, (Part -4) August 2017, Pp.04-1
  • Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers & Mathematics with Applications, 69(1), 58-65.
  • Kanvitha, P., Sirisha, M., & Chowdary, K. (2017). Time Table Management System Using Raspberry Pi and RFID. International Research Journal of Engineering And Technology (IRJET), 4(2395-0056).
  • Lee, C. I., & Chien, H. Y. (2015). An elliptic curve cryptography-based RFID authentication securing E-health system. International Journal of Distributed Sensor Networks, 11(12), 642425.
  • Priyanka, S. (2017). RFID based vehicle access control and tracking with IoT. International Journal of Engineering And Techniques, 3(0974-5645).
  • Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of medical systems, 39(1), 153.
  • Warke, K., Mahamad, M. A. S., Sunil, M. G. S., & Sudhir, M. N. B.(2018). Smart Ration Card System using RFID and Embedded System., International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 4 Issue: 3

Get high-quality help

img

Barry Silbert

imgVerified writer
Expert in:Information Science and Technology

4.7 (135 reviews)

I recently got 90% on the research paper these guys wrote. The writer was really intense and made sure it met guidelines required.


img +122 experts online

Learn the cost and time for your paper

- +

In addition to visual imagery, Cisneros also employs sensory imagery to enhance the reader's experience of the novel. Throughout the story

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

+122 experts online
img