Title: Advanced multi-step security scheme using PCA for RFID system and its FPGA implementation

Authors: Joyashree Bag; Subhashis Roy; Bijoy Kantha; Subir Kumar Sarkar

Addresses: Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata 700032, West Bengal, India ' Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata 700032, West Bengal, India ' Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata 700032, West Bengal, India ' Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata 700032, West Bengal, India

Abstract: Security of stored data within a RFID tag and the data transmission process is important to both the designer and the user. The application of RFID in various domains is increasing owing to its ease of use, flexibility, low cost and enormous advantages of quick accessing and data transfer technology. Those deployments have a risk of unauthorised access to sensitive biometric or financial information through the tag communication. In this paper, programmable cellular automata (PCA) have been used to achieve a multi-step security for an RFID system. The proposed scheme has high level of security, as it provides step by step encryption with different keys and PCA rules for each part. The complexity of the circuit is reduced significantly by reducing the hardware size and power dissipation to a minimum level. The processor for reader and tag frame generator has been developed and implemented using Xilinx ISE14.3 simulation tools and Kintex™-7 FPGA board.

Keywords: programmable cellular automata; PCA; data security; RFID tags; VHDL; multi-step security; FPGA implementation; field-programmable gate arrays; encryption; cryptography; RFID security; hardware size; power dissipation; simulation.

DOI: 10.1504/IJRFITA.2015.070553

International Journal of Radio Frequency Identification Technology and Applications, 2015 Vol.4 No.4, pp.325 - 341

Received: 30 Sep 2013
Accepted: 29 Oct 2014

Published online: 10 Jul 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article