Read / Write Performance for low memory passive HF RFID tag-reader system

Certain applications of passive radio frequency identification (RFID), such as those in healthcare where the patient's name, identification or medical record must be stored, require data within a tag to be encrypted. Encrypted data within an RFID tag has the potential to affect the accuracy or time to read/write the data by the reader. The current research measures and analyzes the effects of encryption, distance of read and delay time between two read/write cycles on the accuracy of the read or write function in an RFID infrastructure. The research also measures and evaluates the time to read/write (R/W) data that is encrypted and compares this encrypted data with unencrypted data. The data encryption standard (DES) encryption method is used in this research due to the limitation of the tag. A multi-functional interface has been developed for the user to test the performance using a High Frequency RFID reader. The measurements were repeated 1000 times for each R/W test. The performance of R/W accuracy is not affected in any meaningful way by encryption even though there is an increase in memory requirement from 88 bytes to 128 bytes. The effect of R/W distance shows that the performance decreases with increase in the distance between the reader and the tag. By inserting a small amount of delay time between different cycles, we can get a significant increase up to 100% accuracy for read function. However, the write accuracy is not affected as significantly as the read accuracy. The effect of the encryption on the time to write the data on the tag shows that encrypted data group takes 70-120 milliseconds for the transmission more than the unencrypted data group. We conclude that while the encryption does not have a significant impact on the accuracy of R/W, the distance and cycle delay does. Also, the encrypted data takes longer to write to the tag.

[1]  Diana Twede,et al.  Radio frequency identification (RFID) performance: the effect of tag orientation and package contents , 2006 .

[2]  Pawel Rotter,et al.  A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.

[3]  Daniel D. Deavours,et al.  Evaluation of the State of Passive UHF RFID: An Experimental Approach , 2007, IEEE Systems Journal.

[4]  Adam Freeman,et al.  Programming .Net Security , 2003 .

[5]  Raphael C.-W. Phan,et al.  Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI , 2009, IEEE Transactions on Dependable and Secure Computing.

[6]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Li Liu,et al.  RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[8]  Rajit Gadh,et al.  Radio frequency identification: beyond the myths. A case for health care , 2008 .

[9]  Wei Tsang Ooi,et al.  WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications , 2005 .

[10]  Kay Eager Zebra , 2001, Journal of pastoral care.

[11]  Fan Wu,et al.  The application of RFID on drug safety of inpatient nursing healthcare , 2005, ICEC '05.

[12]  Daniel D. Deavours,et al.  Performance benchmarks for passive UHF RFID tags , 2006, MMB.

[13]  Tatsuo Arai,et al.  Parts and packets unification radio frequency identification (RFID) application for construction , 2005 .

[14]  Rajit Gadh,et al.  On the Identification Device Management and Data Capture via WinRFID1 Edge-Server , 2007, IEEE Systems Journal.

[15]  Wolf-Christian Rumsch,et al.  Challenges for RFID Cross-Industry Standardization in the Light of Diverging Industry Requirements , 2008, IEEE Systems Journal.

[16]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[17]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[18]  Katina Michael,et al.  RFID and Supply Chain Management: Introduction to the Special Issue , 2008, J. Theor. Appl. Electron. Commer. Res..

[19]  K. Shadan,et al.  Available online: , 2012 .

[20]  Ronald E. Rice,et al.  Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.

[21]  Pawel Rotter,et al.  RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.

[22]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[23]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[24]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[25]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[26]  R. Gadh,et al.  WinRFID – A Middleware for the enablement of Radio Frequency Identification ( RFID ) based Applications , 2005 .

[27]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[28]  Rajit Gadh,et al.  APPLICATIONS OF RFID TECHNOLOGY AND SMART PARTS IN MANUFACTURING , 2004 .

[29]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[30]  Rajit Gadh,et al.  On the Utilization and Integration of RFID Data Into Enterprise Information Systems Via WinRFID , 2007 .

[31]  Oscal T.-C. Chen,et al.  Low-Complexity Encryption Using Redundant Bits and Adaptive Frequency Rates in RFID , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[32]  Rajit Gadh,et al.  Radio Frequency Identification of Katrina Hurricane Victims , 2006 .

[33]  Fan Yang,et al.  An improved approach to security and privacy of RFID application system , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..

[34]  Rajit Gadh,et al.  Service organization and discovery for facilitating RFID network manageability and usability via WinRFID middleware , 2008, 2008 Wireless Telecommunications Symposium.

[35]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[36]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[37]  Jiang-Liang Hou,et al.  Quantitative performance evaluation of RFID applications in the supply chain of the printing industry , 2006, Ind. Manag. Data Syst..