Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols

The Internet of Things refers to the use of services provided by the networked objects (things) equipped with computational capabilities. A wide range of devices can be attached to objects to provide them with computing and networking functions, from RFID tags for identification purposes to a variety of wireless sensors. In the case of RFID technologies operating in the UHF band, the EPC Class-1 Generation-2 (EPC-C1G2) is one of the most established working frameworks. The security of this standard is quite low and many researchers have proposed over the last years alternative schemes aimed at correcting its multiple vulnerabilities. Unfortunately, the hardware implementation of such protocols has been long neglected, and it is unclear whether these proposals could fit a low-cost device where very few resources can be devoted to the security functions. In this paper, we address this question by reporting our experiences with the ASIC implementation of two representative EPC-C1G2 authentication protocols. We explore the design space and provide a detailed analysis of the area occupied by the synthesized circuits, their power consumption, and the throughput in terms of protocol runs per second. To the best of our knowledge, this is the first ASIC implementation of two lightweight protocols conforming the EPC-C1G2 specification. We believe that some of the discussion and insights here reported could be helpful to future implementations, both for RFID systems and resource-constrained sensors.

[1]  I. Velez,et al.  Power and energy optimization of the digital core of a Gen2 long range full passive RFID sensor tag , 2008, 2008 IEEE International Conference on RFID.

[2]  Daniel M. Dobkin Radio Basics For UHF RFID , 2008 .

[3]  Mike Burmester,et al.  Lightweight RFID authentication with forward and backward security , 2011, TSEC.

[4]  Alanson P. Sample,et al.  Design of an RFID-Based Battery-Free Programmable Sensing Platform , 2008, IEEE Transactions on Instrumentation and Measurement.

[5]  Maire O'Neill,et al.  Low-Cost SHA-1 Hash Function Architecture for RFID Tags , 2008 .

[6]  Gerald Holweg,et al.  A Multifrequency Passive Sensing Tag With On-Chip Temperature Sensor and Off-Chip Sensor Interface Using EPC HF and UHF RFID Technology , 2011, IEEE Journal of Solid-State Circuits.

[7]  Honorio Martín,et al.  AKARI-X: A pseudorandom number generator for secure lightweight systems , 2011, 2011 IEEE 17th International On-Line Testing Symposium.

[8]  Bill Glover,et al.  RFID Essentials (Theory in Practice (O'Reilly)) , 2006 .

[9]  Joaquín García,et al.  Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags , 2010, Financial Cryptography Workshops.

[10]  Adi Shamir,et al.  New Applications of T-Functions in Block Ciphers and Hash Functions , 2005, FSE.

[11]  R. Weigel,et al.  Energy-Efficient Wireless Sensing Using a Generic ADC Sensor Interface Within a Passive Multi-Standard RFID Transponder , 2011, IEEE Sensors Journal.

[12]  Daniel M. Dobkin Chapter 3 – Radio Basics for UHF RFID , 2013 .

[13]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[14]  Radislav A. Potyrailo,et al.  Temperature-independent passive RFID pressure sensors for single-use bioprocess components , 2011, 2011 IEEE International Conference on RFID.

[15]  Yu-Jung Huang,et al.  Efficient Implementation of RFID Mutual Authentication Protocol , 2012, IEEE Transactions on Industrial Electronics.

[16]  Bevan M. Baas,et al.  A low-power, high-performance, 1024-point FFT processor , 1999, IEEE J. Solid State Circuits.

[17]  K. Varahramyan,et al.  A Chipless RFID Sensor System for Cyber Centric Monitoring Applications , 2009, IEEE Transactions on Microwave Theory and Techniques.

[18]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[19]  Radislav A. Potyrailo,et al.  Integration of passive multivariable RFID sensors into single-use biopharmaceutical manufacturing components , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[20]  Hung-Yu Chien,et al.  A Lightweight Authentication Protocol for Low-Cost RFID , 2010, J. Signal Process. Syst..

[21]  Adi Shamir,et al.  A New Class of Invertible Mappings , 2002, CHES.

[22]  Damith C. Ranasinghe,et al.  Low-Cost RFID Systems: Confronting Security and Privacy , 2005 .

[23]  Xinxin Fan,et al.  Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags , 2012, RFIDSec Asia.

[24]  Radislav A. Potyrailo,et al.  Lab-scale long-term operation of passive multivariable RFID temperature sensors integrated into single-use bioprocess components , 2011, 2011 IEEE International Conference on RFID-Technologies and Applications.

[25]  Junyu Wang,et al.  A Random Number Generator for Application in RFID Tags , 2008 .

[26]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[27]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[28]  Sang Ho Lee,et al.  Security and Privacy on Authentication Protocol for Low-cost RFID , 2006, 2006 International Conference on Computational Intelligence and Security.

[29]  Juan E. Tapiador,et al.  Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming , 2006, 2006 IEEE International Conference on Evolutionary Computation.