Verify Validate 1111

  • Uploaded by: mizismizis
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Verify Validate 1111 as PDF for free.

More details

  • Words: 3,235
  • Pages: 29
Verification & Validation Of RFID handle anticollision and authentication protocol

Date: 29th April 2008 Prepared by:Muhammad Tarmizi B. Lockman

Supervised by: Dr Ali Selamat

Introduction- Several problem and issue that has been debate in RFID industry •When you think about deploying RFID you need to quickly think beyond tags and standards. •Widely accepted standards are not in place. EPCglobal and ISO are developing competing standards whose differences will not be easily resolved Three critical areas of deployment While tag and standards developments will have some bearing on your RFID deployment, we need to critically assess three additional areas early in our initiative: •Readers •RFID middleware •Current processes and systems. Source: By Bret Kinsella (Director, Sapient / Supply Chain) Published by UsingRFID.com in March 2004

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

2

Background Problem From the study, we found several problems that related to this research’s topic. Does the tag success read (without collision) Solution how to solve this problem How does it security What is method of authentication used? Tag and reader replacement need changing on the system Possible solution on adaptive for tag and reader How the verification and validation related to the system problem?

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

3

Problem on Reader RFID readers should be evaluated with equal or greater care than tags. Readers are the engines that make RFID work. Readers play critical roles monitoring various areas and a malfunction could result in missed or incorrect information for large numbers of products, shipments, or assets. They are 'mission critical' equipment. As a result they must be constantly monitored to ensure proper performance. Furthermore, readers can determine the long-term flexibility and reliable of RFID capability. Many readers currently work with only a specific type of tag. This reduces a ability to switch between tag vendors to take advantage of cost or performance break through that can be expected over the next several years. Usually single protocol systems may provide simplicity in initial deployment. We now need to evaluate multi-protocol reader vendors who are developing open systems that can read tags from multiple manufacturers. This approach will provide greater flexibility in deployment and management, as well as better protecting a investment.

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Problem on Middleware Middleware is playing two critical roles in RFID deployment and use. First, it is used to efficiently connect readers to enterprise systems and data repositories. This feature provides benefits in deployment as well as benefits after implementation when other new systems are introduced. Second, most RFID middleware vendors are developing tools to filter data more effectively, and to remotely monitor, control, and maintain readers. These tools can make RFID more valuable to business users and also reduce the challenges involved in the deployment and long-term management of the hardware. Any project beyond a very limited pilot should include RFID middleware as a core component.

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Problem on process and system It is deployed to support or improve existing processes or provide new capabilities. RFID deployments should start with a process and systems analysis not with tag selection. Example:-Tourist rfid system Understanding a existing processes and systems and how they will be impacted by RFID will help to establish project requirements (determine a tag and reader selection criteria).

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Scope of Research Scope of this study will focus on:Focus on development model or example RFID; what is the suitable method for collision avoidance and suitable authentication protocol used? (Reader and middleware) Model of anticollision and authentication protocol that purpose will support RFID system as adaptive to ensure solve delay, privacy and collision (Reader and middleware) How the verification and validation related to this problem?, how to confirm that message on tag validate to the system? The effectiveness and accuracy of the propose will be compare with other method Which techniques are the best to solve the problem?

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

7

Research Objective Below are the objectives of this research:To determine anti-collision protocol and authentication protocol that have problem. Solve the problem. To analyse how to do verification and validation on the RFID system. To design the architecture of how verify and validate in RFID system.

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

8

Literature Reviews-Outline Verification and Validation on RFID system Authentication protocol Anti collision protocol Tree Walking Singulation Protocol Aloha Singulation protocol

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

9

Verification and validation on RFID system •Verify and validate of rfid can be implement on hardware and software requirement. •Usually each tag only can be read by reader in same protocol. Different manufacture if used same protocol standard also can be read successful. •For example case study for smart card or contactless card/ passive tag. The reading process must follow the step in term verification of the data from tag to reader. Follow manufacture standard and acknowledgment command transmit and command respond. There are two main goal in verify and validate the RFID system: To produce a model that represent true system behaviour. To establish the credibility of a simulation model of the system Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Authentication Protocol-Hash Based Protocol •Using Hash-based protocols. This hash–base is static-ID or DynamicID

metaID = h(k)

•Comparison Static-ID and Dynamic-ID Approach

Static-ID-based approach merits • does not require synchronization • requires DB operations •• suitable difficultyfor to distributed provide database Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Dynamic-ID-based approach • requires only DB search operation • requires •synchronization can provide forward secrecy

Template Applied Research - SRM 1.0

Authentication Protocol An approach to solve the security problems is using security protocol at the design level before implementation. This can be widely researched in RFID systems using Casper and FDR. Example Model Checking Methodology for Authentication Protocol Casper was developed by Gavin Lowe is a compiler that translates a more simple and concise description of a security communication model into CSP code Verification of the safety specifications in Authentication Protocol scheme, use traces refinement provided in FDR (Failure Divergence Refinement) tool Note:-CSP(Communicating Sequential Processes) is a language for process specification specially designed to describe communication processes, and it can describe both a pure parallelism and interleaving semantics

Hyun-Seok Kim and Jin-Young Choi “,The design and verification of RFID Authentication protocol for ubiquitous computing” 18th International Workshop on Database and Expert Systems Applications2007 IEEE Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Taxonomy of anti-collision protocol for RFID tags Various radio communication technology SDMA (Space Division Multiple Accesses) TDMA (Time Division Multiple Accesses) FDMA (Frequency Division Multiple Accesses) CDMA (Code Division Multiple Accesses)

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Tree Walking Singulation "tree walking", which involves asking all tags with a serial number that starts with either a 1 or 0 to respond If more than one responds, the reader might ask for all tags with a serial number that starts with 01 to respond, and then 010. It keeps doing this until it finds the tag it is looking for.

For example with some designs of tags, if a reader already suspects certain tags to be present then those tags can be instructed to remain silent, the tree walked without interference from them, and then finally they can be queried individually.

 Note that if the reader has some idea of what tags it wishes to interrogate, it can considerably optimize the search order. Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

14

Aloha Singulation Protocol ALOHA protocol, originally used decades ago in ALOHAnet and very similar to CSMA/CD used by Ethernet. These protocols used in HF tags. In ALOHA, tags detect when a collision has occurred, and attempt to resend after waiting a random interval. The performance of such collide-and-resend protocols is approximately doubled if transmissions are synchronized to particular time-slots, and in this application time-slots for the tags are readily provided for by the reader.  ALOHA does not leak information like the tree-walking protocol, and is much less vulnerable to blocker tags, which would need to be active devices with much higher power handling capabilities in order to work.

“Performance Analysis of Tag Anti-collision Algorithms for RFID” Cheng-Hao Quan1, Won-Kee Hong2, Hie-Cheol Kim2 EUC Workshops 2006, LNCS 4097, pp. 382–391, 2006. IFIP International Federation for Information Processing 2006

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

15

Aloha Singulation Protocol

PC= progressed-slot counter AC= allocated-slot counter RC(r) is reader r’s allocated-slot counter).

•Tag ti decides the timeslot for the transmission with a progressed-slot counter, PC, and an allocated-slot counter, AC(i). •PC means the number of tags recognized by the reader in the ongoing process. • AC(i) signifies the timeslot for ti’s transmission, i.e., ti transmits when PC = AC(i). The tags, which have the same value of the allocated-slot counter, form a set. Tag collision occurs if a set include multiple tags.

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

OUR PROPOSE

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Problem Background

Multiple tag

Multiple reader

No Privacy for tag

Undetected tag Authentication tag

Collision Tag Time delay

Hard to Validate tag ID

Solution

Hybrid anti-collision protocol and authentication protocol approach Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

DISCUSSION Each of RFID tag need to verify on each of memory location which contain on RFID memory. Basically each of RF Tag will representing on their uniquely of serial number by manufacture. Each of memory location can store user information that we will verify and validate on the authentication process. As we mention before data verification and validate need to be pass trough the authentication and manufacture protocol stack command send/respond During the collision at reading environment tag ware expose to untraced and unread Collision avoidance using using hash-based and methodology model checking, Casper and FDR Model of anticollision and authentication protocol that purpose will support RFID system as adaptive to ensure solve delay, privacy and collision

Combining Hybrid anti-collision protocol and authentication protocol approach can solve problem we mention before at background problem Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Literature Reviews – Related to research No

Previous Paper

About

Advantage

Tool

1.

Adaptive Binary Splitting for Efficient RFID Tag Anti-Collision

Tag collision arbitration for passive RFID tags is a significant issue for fast tag identification. This letter presents a novel tag anti-collision scheme called Adaptive Binary Splitting (ABS). For reducing collisions, ABS assigns distinct timeslots to tags by using information obtained from the last Identification process. Our Performance evaluation shows that ABS outperforms other tree based tag anti-collision protocols

Adaptive of anti collision protocol reduce collision, better tag identification and shorten time read tag

presents a novel tag anti-collision scheme called Adaptive Binary Splitting (ABS).

2.

J. Zhai and G. Wang, “An anti-collision algorithm using two-functioned estimation for RFID tags,” in Proc. ICCSA’05, LNCS 3483, pp. 702-711, May 2005.

Tag anti-collision protocols are separated into aloha-based and tree-based. Aloha-based protocols such as aloha, slotted aloha, and frame aloha [1], [2], [3] reduce the occurrence probability of tag collisions since tags transmit at distinct times. However, aloha-based protocols cannot completely prevent collisions and hence they have ‘tag starvation problem’ that a specific tag may not be identified for a long time. In Tree based protocols which are based on the collision resolution

Aloha-based protocols such as aloha, slotted aloha, and frame aloha for anti-collision protocol

aloha based protocol used to avoid collision

“EPCTM radio-frequency identification protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz960MHz Version1.0.8,” EPCglobal, Dec. 2004. “Information technology automatic identification and data capture techniques – radio frequency identification for item management air interface- part 6: parameters for air interface communications at 860-960 MHz,”ISO/IEC FDIS 18000-6, Nov. 2003.

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

20

Literature Reviews – Related to research No

Previous Paper

3.

Dynamic key-updating: Privacy-preserving authentication for rfid system

4.

A hybrid based rfid authentication protocol supporting distributed database

About

Propose key updating method when efficient key search algorithm present, Strong and lightweight RFID private Authentication protocol (SPA). There are comparison the design with previous schemes because many active attacks especially compromising attack.

Hybrid authentication protocol Combine static and dynamic based approach.

Advantage

Tool

Avoid the collision during transmit space . A circuit has been proposed that can implement the anti-collision protocol for passive tags, and its functionality has also been investigated..

Binary tree protocol used to develop circuit. Protocol has been constructed using SIMUAID simulator

Hybrid authentication protocol Combine static and dynamic based Approach can support distributed database

hash-based protocols

Sangjin Kim, Jihwan Lim, Heekuck Oh, 2007 International Conference on Convergence Information Technology

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

21

Literature Reviews – Related to research No

Previous Paper

About

Advantage

Tool

5.

Anti-collision Protocol Development for Passive RFID Tags Nowshad Amin, Puah Weng Lin, Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007

When multiple tags transmit IDs simultaneously, the Signals collide and this collision disturbs a reader’s identification process.Collision problem can be divided into reader collision and tag collision. Tag collision is taken into account in this study since most of the applications involve tag collision problem. Therefore, an anti-collision protocol is developed to solve this issue .

Avoid the collision during transmit space . A circuit has been proposed that can implement the anti-collision protocol for passive tags, and its functionality has also been investigated..

Binary tree protocol used to develop circuit. Protocol has been constructed using SIMUAID simulator

6.

A hybrid based rfid authentication protocol supporting distributed database

Hybrid authentication protocol Combine static and dynamic based approach.

Hybrid authentication protocol Combine static and dynamic based Approach can support distributed database

hash-based protocols

Sangjin Kim, Jihwan Lim, Heekuck Oh, 2007 International Conference on Convergence Information Technology

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

22

Literature Reviews – Related to research No 7.

Previous Paper Performance Analysis of Tag Anti-collision Algorithms for RFID

Cheng-Hao Quan1, Won-Kee Hong2, and Hie-Cheol Kim2 EUC Workshops 2006, LNCS 4097, pp. 382–391, 2006. IFIP International Federation for Information Processing 2006

8.

The design and verification of RFID Authentication protocol for ubiquitous computing Hyun-Seok Kim and Jin-Young Choi 18th International Workshop on Database and Expert Systems Applications2007 IEEE

About

Advantage

Tool

RFID system should provide the multi-protocol support for tag identification and a proper protocol should be chosen Depending on the situation. The tag anti-collision algorithm is one of the important research issues to be on top of the protocol’s performance. This paper introduces several anti-collision algorithms for tag identification in the literature and presents the performance comparison and evaluation of those algorithms based on the 96-bit EPCTM (Electronic Product CodeTM).

.. The performance results show that the collision tracking tree algorithm is found to have the highest performance than any other anticollision algorithm, identifying 749 tags per second.

Tree based memoryless anticollision algorithm Slot aloha based anticollision algorithm

This paper presents issues concerning security and privacy of RFID Systems which are heavily discussed in public and introduces Authentication Protocol for a RFID security protocol which serves as a proof of concept for authentication an RFID tag to a reader device using the vernam and standard encryption as a cryptographic primitive. To verify the protocol, they use model checking methodology

propose an approach to solve the security problems using security protocol at the design level before implementation, This can be widely researched in RFID systems using Casper and FDR. In verifying a protocols with the FDR tool, were able to confirm that this protocols protect against some of the known security vulnerabilities that are likely to occur in RFID systems

Model Checking Methodology for Authentication Protocol Casper(A Compiler for Security Protocol), CSP(Communicating Sequential Processes) verify security properties such as secrecy and authentication using FDR(Failure Divergence Refinement) tool.

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

23

Literature Reviews – Related to research No 9.

Previous Paper Taxonomy and survey of RFID anti-collision protocols

About

Advantage

Tool

Taxonomy about RFID anti-collision protocol Solve an bandwidth and increasing delay problem.

Support the specification & composition of business protocols. survey the collision resolution protocols for multi-access communication and the algorithms that calculate how to minimize reader-to-reader interference. A comparative view of surveyed protocol was concluded for the collision problem in RFIDsystems.

aloha , binary tree QT protocol , Contactless protocol I-code protocol

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

24

Methodology -Research Flowchart

RFID

Identify Problems

Comparative study and analysis

Verification & Validation

Solve the RFID system

Analysis

handle

Collision & Authentication

Evaluate Result

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Conclusion

Hope the intentions have been addressed in this project objective Future Work: Agent technology to make adaptive tag in the system Construct architecture and flow to Verify & Validate RFID system

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

26

Future Planning 2007

Activities J

F

M

A

M

J

J

2008 A

S

O

N

D

J

F

M

A

M

J

J

A

S

O

N

D

Research Process Studies on RFID toward the application and on issued in the RFID Industry . Analyse and study on RFID and how to handles protocol, authentication on verify and validation issue . Study and analysed RFID authentication protocol and compare various type of other protocol used Implement case study of prototype using e-tourist based on mobile devices, programming language, GUI

Development Process Design and develop the system

Simulate ,test and validate the system Analysis of the results and discussions

Writing project reports

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

27

THANK YOU Q&A

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

28

Communication Service Layer: This layer provides the equivalent functions of the Data Link, Network and Transport layers of the OSI reference model. These include reader networking both wired and wireless and also the communication link between a reader and tag and the Media Access Control (MAC). Application Service Layer: This layer consists of various “back-end” enterprise applications Physical Service Layer: Physical layer in the OSI reference model and comprises of readers, antennas, passive, semi-active, active RFID tags, sensors, motes, etc. Integration Service Layer:This is a new layer that is created for RFID to efficiently handle a huge volume of raw RFID data in real-time. It also provides a means to integrate the back-end enterprise system

Muhammad Tarmizi Lockman. All Rights Reserved © 2008

Template Applied Research - SRM 1.0

Related Documents

Verify Validate 1111
May 2020 11
Validate
October 2019 18
Verify
October 2019 13
1111
July 2020 15
1111
July 2020 11
1111
November 2019 20

More Documents from ""

Verify Validate 1111
May 2020 11