A Gen2-Based Rfid Authentication Protocol For Security And Privacy

RADIO Frequency Identification (RFID) tags for the function of next-generation electronic product code (EPC) will become one of the most widely used devices in the near future an RFID. Once the tag is found valid, the back-end database will look up its product information for further processing. RFID tags are classified into three types: active, semi passive, and passive. Active tags contain batteries so that they can actively communicate with the reader. Semi passive tags also contain batteries but they wait for the reader’s query. As for passive tags, the power comes from the reader. The class of a tag represents the effective reading range. We analyzed the number of rounds required and the period of key update for practical deployment.

Existing System:

Radio Frequency Identification (RFID) systems are a common and useful tool in manufacturing, supply chain management and retail inventory control. Optical barcodes, another common automatic identification system, have been a familiar packaging feature on consumer items for years. Due to advances in silicon manufacturing technology, RFID costs have dropped significantly. In the near future, low-cost RFID “electronic product codes” or “smart-labels” may be a practical replacement for optical barcodes on consumer items.

Unfortunately, the universal deployment of RFID devices in consumer items may expose new security and privacy risks not present in closed manufacturing environments. This presents an introduction to RFID technology, identifies several potential threats to security and privacy, and offers several practical proposals for efficient security mechanisms. We offer several policy suggestions and discuss various open questions and areas of research.

Proposed System:

In this project, we propose a novel authentication protocol based on Gen2, called Gen2+, for low-cost RFID tags. Our protocol follows every message flow in Gen2 to provide backward compatibility. Gen2+ is a multiple round protocol using shared pseudonyms and Cyclic Redundancy Check to achieve reader-to-tag authentication. Conversely, Gen2+ uses the memory read command defined in Gen2 to achieve tag-to-reader authentication. We show that Gen2+ is more secure under tracing and cloning attacks.


  • Tag reader authentication module

  • Crypt analysis module

  • DB verification Module

  • Private and Public mode module

Tools Used:

Front End : Asp .Net
Coding Language : C#.NET
Back End : Sql Server 2000