Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

AN ARCHITECTURAL APPROACH FOR REDUCINGPOWER AND INCREASING SECURITY OF RFID TAGS

Tung, Shen Chih (2008) AN ARCHITECTURAL APPROACH FOR REDUCINGPOWER AND INCREASING SECURITY OF RFID TAGS. Doctoral Dissertation, University of Pittsburgh. (Unpublished)

[img]
Preview
PDF
Primary Text

Download (3MB) | Preview

Abstract

Radio Frequency Identification (RFID) technology is currently employed for a variety of applications such as RFID-based wireless payment, healthcare, homeland security, asset management,etc. Due to newer privacy requirements and increasingly secure applications, typical RFID tags are required to expand security features such as data encryption and safe transactions. However, RFID tags have extremely strict low-power consumption requirements. Thus, reduced power consumption and secure data transactions are two main problems for the next generation RFID tags.This dissertation presents an architectural approach to address these two main problems.This dissertation provides a multi-domain solution to improve the power consumption andsecurity, while also reducing design time and verification time of the system. In particular, Idescribe (1)a smart buffering technique to allow a tag to remain in a standby mode until addressed,(2)a multi-layer, low-power technique that transcends the passive-transaction, physical, and data layers to provide secure transactions, (3) an FPGA-based traffic profiler system to generate traces of RFID communications for both tag verification and power analysis without the need of actual hardware, and (4) a design automation technique to create physical layer encoding and decoding blocks in hardware suitable for RFID tags.This dissertation presents four contributions: (1) As a result, based on a Markov Process energymodel, the smart buffering technique is shown to reduce power consumption by 85% over a traditionalactive tag; (2) The multi-layer, low-power security technique provides protection againstmalicious reader attacks to disable the tag, to steal the information stored in or communicatedto the device. The power consumption overhead for implementing these layers of security is increased approximately 13% over the basic tag controller; (3) In addition, the FPGA-based traffic profiler system has been able to generate traces for ISO 18000 part 6C (EPC Gen2) protocol; and (4) The designs of endocing/decoding blocks are generated automatically by the Physical LayerSynthesis tool for five protocols used in or related to RFID. Consequently, any power consumption of five designs is less than 5 £gW. Furthermore, compared with five designs implemented by hand, the difference of the power consumption between two of them is less than 7% at most.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: University of Pittsburgh ETD
Status: Unpublished
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Tung, Shen Chihsctung@gmail.com
ETD Committee:
TitleMemberEmail AddressPitt UsernameORCID
Committee ChairJones, Alex K.akjones@ece.pitt.eduAKJONES
Committee MemberAmer, Ahmedamer@cs.pitt.edu
Committee MemberCheng, Allenaccheng@ece.pitt.edu
Committee MemberMickle, MarlinMickle@engr.pitt.eduMICKLE
Committee MemberCain, Tomcain@engr.pitt.eduJTC
Date: 8 September 2008
Date Type: Completion
Defense Date: 28 March 2008
Approval Date: 8 September 2008
Submission Date: 23 March 2008
Access Restriction: No restriction; Release the ETD for access worldwide immediately.
Institution: University of Pittsburgh
Schools and Programs: Swanson School of Engineering > Electrical Engineering
Degree: PhD - Doctor of Philosophy
Thesis Type: Doctoral Dissertation
Refereed: Yes
Uncontrolled Keywords: Design Automation Tool; Low Power; RFID Tags; Security
Other ID: http://etd.library.pitt.edu/ETD/available/etd-03232008-233627/, etd-03232008-233627
Date Deposited: 10 Nov 2011 19:32
Last Modified: 19 Dec 2016 14:35
URI: http://d-scholarship.pitt.edu/id/eprint/6564

Metrics

Monthly Views for the past 3 years

Plum Analytics


Actions (login required)

View Item View Item