Implementation of a Secure RFID Protocol

Baskir S. G., Ors B.

21st Signal Processing and Communications Applications Conference (SIU), CYPRUS, 24 - 26 April 2013 identifier

  • Publication Type: Conference Paper / Full Text
  • Country: CYPRUS
  • Istanbul Technical University Affiliated: Yes


RFID is an ever prevalent becoming technology. This increase of use brings its disadvantage, efforts to breach its security. As a result, generating cryptology algorithms is a solution that should be worked upon. In this project an implementation of an RFID authentication protocol is described. In the implementation, in order to simulate tag and reader, suitable electronic cards are equipped. Because of the fact that the microcontrollers' memory sizes and processing capability are very important, the selection of microcontrollers which are capable for this implementation is made with considering these parameters. After the preparing section of tag and reader, these steps are executed consecutively; communication between electronic cards is built individually, AES functions are executed then communication between cards is built. After all, the execution of authentication protocol between tag and reader is aimed.