SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 5, Issue 5 (Mar. - Apr. 2013), PP 51-55
www.iosrjournals.org
www.iosrjournals.org 51 | Page
Implementation of XOR Based Pad Generation Mutual
Authentication Protocol for RF Link
Ramya K1
, Asst.Prof Priyadarshini G2
1 (
Department of ECE, Mount Zion College of Engineering & Technology, Tamil Nadu, India)
2(
Department of ECE, Mount Zion College of Engineering & Technology, Tamil Nadu, India)
Abstract: In RF link, without security the messages exchange between the two devices are monitoring by an
eavesdropper. So the exclusive-OR (XOR) based pad generation protocol is used to safely transfer the data to
the other point with necessary security and it maintaining confidentiality. This protocol produce the cover
coding pad to mask the access password before the datas are transmitted. A specially designed pad generation
will be implemented in digital domain to solve the insecurity problem in data communication RF link. This
protocol developed under regulation of ISO 18000 – 6 type C protocol also known as EPC C1G2 RFID
protocol. The linear feed back shift register (LFSR) generate the pseudo random binary sequence (PRBS) and it
is used as data source to the pad generation function. The Xilinx 13.x software is used for synthesize and
modelsim SE6.0 is used for simulating the result. The pad generation algorithm has been implemented in FPGA
Spartan 3 PQ208-4 board to verify the result.
Keywords- Field-programmable gate array (FPGA) implementation, mutual authentication, RF link, security,
Zigbee.
I. Introduction
Radio Frequency Identification (RFID) technology uses a wireless system that can provide efficient
real-time device track-and-trace capability. The ultra high frequency (UHF) RF for data communication using
devices operating in industrial-scientific-medical (ISM) band. The EPC global Inc. is the leader in developing
industry-driven specifications for the electronic product code (EPC) to support the use of RFID in supply chain
management [1].The international standard organization (ISO) has incorporated the EPC class-1 generation-2
(C1G2) UHF standard into its ISO/IEC 18000-6 amendment type C. The ISO 18000-6C protocol also known as
EPC C1G2 protocol, provides only basic security tools using a16-b pseudo random number generator and 16-b
cyclic redundancy code. However, the EPC C1G2 specification do not fully support privacy invasion and data
security issues [2].
A passive eavesdroppers monitoring the message exchange between the sender and the receiver by
simply computing an exclusive-OR (XOR) operation [3]. To exposed this weakness a proposed sender and
receiver (tag- reader) mutual authentication scheme protect the access password [4]. But after simple
computations an attacker could acquire the access password (Apwd) and kill password (Kpwd) with high
probability [4]. Many light weight authentication protocols that use only efficient bitwise operations like XOR,
AND, OR etc, have been proposed [5]. However, most of the proposed protocols have not been verified with
hardware [2]. The Field programmable gate array (FPGA)-based systems gain particular flexibility for verifying
hardware implementations. Due to the advantages of FPGA prototyping based verification, a large number of
systems have been implemented in FPGAs in different fields, such as radio communication protocol [6],
robotics [7], [8], power system [9] and signal processing [10].
PRBS is generated using the linear feed back shift register and it is the data source to the pad
generation function. Pad generation function produce the cover coding pad to mask the access password. The
design of X-OR based pad generation protocols achieving the mutual authentication between the sender and the
receiver. This protocol providing an adequate security for data communication RF link. An efficient hardware
implementation of X-OR based pad generation mutual authentication protocol is described in this paper.
This paper is organized in the following way. In section II LFSR functions and In section III pad
generation operations are designed and provided. In section IV the implementation design of the pad generation
protocol in FPGA is provided and discussed. In section V simulation and schematic results are presented and
discussed. Finally, this paper is concluded in section VI.
II. Linear Feed Back Shift Register Function
The pad generation (PadGen) function is the key function used to produce cover-coding pad to mask
the access password before transmission. The implementation of the PadGen function also requires the random
number generator to produce RTx and RMx. A typical linear feedback shift register (LFSR) is used to generate
pseudo random numbers (2N
-1). A Linear Feedback Shift Register (LFSR) is a shift register whose input bit is
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link
www.iosrjournals.org 52 | Page
a linear function of its previous state. Mostly used linear function of single bits is XOR, thus normally it is a
shift register whose input bit is driven by the exclusive-or (XOR) of some bits of the overall shift register value.
The initial value of the LFSR is called the seed, and because the operation of the register is deterministic, the
stream of values produced by the register is completely determined by its current (or previous) state. Likewise,
because the register has a finite number of possible states, it must eventually enter a repeating cycle.
An LFSR with an ell-chosen feedback function can produce a sequence of that appears random and has
a very long cycle. For an n-bit LFSR, the LFSR can generate a (2N
− 1)-bit long pseudo random sequence before
repeating. A maximum-length LFSR produces an m-sequence (i.e., cycles through all possible 2N
− 1 states
within the shift register except the state where all bits are zero). In this paper, the parallel load count PRBS was
implemented because it is more suitable for hardware implementation.
III. Xor Based Pad Generation Operation
An access password is required before data are exchanged between a sender and a receiver. The access
password is a 32-b value. Konidala uses a specially designed pad generation function to produce the cover
coding pad to mask the access password before the data are transmitted [4].The main problem with the scheme
is infact if that inputs in the pad generation are known to an eavesdropper and this information can be used to
obtain correlations to recover the access password under a correlation attack[3].To mitigate this drawback, the
inputs to the pad generation function must be hidden from the eavesdropper. So, this is done by X-OR pad
generation mutual authentication protocol .The detailed steps of the XOR schemes to generate the Pad
generation function are presented as follows.
Lets us represent the 32-b Apwd and Kpwd as
Apwd = a0a1a2 ………..a30a31 (base 2) (1)
Kpwd = k0k1k2 ………..k30k31 (base 2) (2)
The 16-b random numbers are represent as input in below
RTx = ht1ht2ht3ht4 (base 16)
= dt1dt2dt3dt4 (base 10) (3)
RMx = hm1hm2hm3hm4 (base 16)
= dm1dm2dm3dm4 (base 10) (4)
Apwd-PadGen (RTx, RMx)
= adt1adt2adt3adt4||adt1+16adt2+16adt3+16adt4+1||adm1adm2adm3adm4||adm1+16adm2+16adm3+16adm4+16
= dV 1dV 2dV 3dV 4 (base 10)
= RV (5)
RT⨁RM= RT⨁M
= dx1dx2dx3dx4 (6)
Apwd-PadGen (RT, RT⨁M)
= adt1adt2adt3ad4||adt1+16adt2+16adt3+16adt4+16×||adx1adx2adx3adx4||adx1+16adx2+16adx3+16adx4+16
= dW1dW2dW3dW4 (base 10)
= RW (7)
Kpwd-PadGen(RV,RW)
=kdV1kdV2kdV3kdV4||kdV1+16kdV2+16kdV3+16kdV4+16×||kdW1+kdW2+kdW3+kdW4×||kdW1+16kdW2+16kd
W3+16kdW4+16
= hq1hq2hq3hq4 (base 16)
= PAD1 (8)
RV⨁RW
= RV⨁W
= ds1ds2ds3ds4 (9)
Kpwd-PadGen (RV, RV⊕W)
=kdV1kdV2kdV3kdV4||kdV1+16kdV2+16kdV3+16kdV4+16×||kds1kds2kds3kds4×||kds1+16kds2+16kds3+
16 kds4+16
= hr1hr2hr3hr4 (base 16)
= PAD2 (10)
By performing XOR operation the following cover-code Apwd is obtained
CCPwdM1 = ApwdM ⨁ PAD1 (11)
C CPwdL1 = ApwdL ⨁ PAD2 (12)
For the Pad generation proposed by Konidala et al. [4] , each PAD function is computed based on one
set of (RTx, RMx), which is transmitted in the open space. In contrast to the PadGen proposed by Konidala et al.,
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link
www.iosrjournals.org 53 | Page
the present proposed pad function is computed based on one set of (RV, RW), which is not transmitted openly.
RV and RW are computed based on Apwd–PadGen (RTx, RMx) and Apwd-PadGen (RTx, RTx ⨁ RMx),
respectively. PAD1 and PAD2 are then generated by Kpwd-PadGen (Rv, Rw) and Kpwd-PadGen (RV, RV ⨁ RW),
respectively.
XOR
Register
XOR
RM_Register
3 to 2
MUX
RT_RegisterRTX
Register 2
Register 1
Control
2 to 1 MUX
RT
/16
/16
/16
RM
RV
/16
/16
PAD
GEN
RW
Apwd/16
PAD 1
/16
PAD 2
/16
Kpwd/16
/16
RMX
/16
RT
/16
1 to 2
MUX
Figure 1 Functional block diagram of the XOR pad generation operation
IV. Design And Hardware Implementation
The proposed system block diagram of Transmitter and receiver is respectively shown in ―Fig. 2‖ and
―Fig. 3‖.The proposed system working principles and detailed description is given below. The datas are
transmitted with secure manner by Xor pad generation (PadGen) protocol. Here, pad generation protocol
produce cover coding pad to mask the access password and FPGAs are chosen for implementation. Zigbee is the
RF transreceiver to transmit and receive the data.
Figure 2 Block diagram of transmitter
The FPGAs running with 4MHZ clock. First we generate the parallel load PRBS by using LFSR and
then result is given to the data mapping unit to converts the serial output came from the LFSR to parallel form,
then it is given as the input to the pad generator. Universal trigger/control unit control each module in the
implementation. Then generated PAD is convert into serial which is suitable for RF transmission and it is
transmitted through RS 232 to the communication transmitter circuit, Here this communication transmitter
circuit has Zeener diode as a regulator. The outcoming pads is transmitted through the zigbee in the RF link. The
transmitted data through the RF link is received by the Zigbee in the receiver side and then it is given to
communication receiver circuit which has LM317 regulator. The received data is transfer to the pad degenerator
through the Data demapper unit. Finally, In the receiver side the obtained cover coding pad is degenerated by
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link
www.iosrjournals.org 54 | Page
pad degenerator. It is verified and displayed through LCD display, then error is calculated by Bit error calculator
therefore if it has an error it will be displayed through the 7- segment display.
Figure 3 Block diagram of receiver
V. Results And Discussions
The Verilog schematic and simulation results of FPGA implementation are shown in ―Fig. 4.a & Fig
4.b‖ and ―Fig. 5‖ respectively. Initially the 4-MHZ synchronous clock is applied to the FPGA board. The master
clock and start_in are given as the input to the LFSR. Initially start_in is in‗0‘ then output is zero, If start_in is
‗1‘ then PRBS starts to generate. The generated PRBS output is nothing but the random number (RTX and
RMX).The random number is given as the input to the XOR based pad generation function.
The functional block diagram of the XOR-PadGen function for mutual authentication is described in the
previous section as shown in ―Fig. 1‖. This approach can obtain PAD1 and PAD2 using one set of (RTx, RMx).
This approach is a more efficient way to generate PAD function for mutual authentication. After the initial input
of random numbers RTx and RMx, a multiplexer was utilized to control the selection of Apwd or Kpwd for
PadGen operation. PAD1 and PAD2 are then simultaneously generated to cover-coded Apwd for mutual
authentication. As shown in ―Fig. 1‖, the details of the functions performed are described as follows.
 Apwd-PadGen (RTx,RMx)=dv1dv2dv3dv4=RV. RTx, RMx, and Apwd are selected as the inputs for PadGen
operation and the calculation results RV by XOR-PadGen operation are stored in register for further
manipulation.
 Apwd-PadGen (RT,RT⨁RM)=dw1dw2dw3dw4= RW. Through mux selection, RT, (RT⨁RM), and Apwd are
chosen as inputs for PadGen operation. The calculation result RW is stored in register for further
computation.
 Kpwd-PadGen (RV,RW)= hq1hq2hq3hq4 = PAD1. The PAD1 as shown in can then be obtained by mux
selecting RV, RW, and Kpwd as inputs for XOR-PadGen operation.
 Kpwd-PadGen(RV,RV ⨁ RW)=hr1hr2hr3hr4=PAD2. Similarly, the PAD2 can then be obtained using
RV,RV⨁RW, along with Kpwd for XOR-PadGen operation.
Simulations of the design were conducted in the modelsim SE 6.0. The verified Verilog code will be then
downloaded on an Virtex Spartan 3 PQ208-4 board. FPGA running with a 4-MHz clock to verify the hardware.
The simulated result of XOR pad generation protocol is shown below in ―Fig.5‖.
Figure 4.a Figure 4.b
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link
www.iosrjournals.org 55 | Page
Figure 4.a & 4.b RTL Schematic diagrams of xor pad generation
Figure 6 Verilog simulation result of xor pad generation
VI. Conclusion
This research work is to improve the security level of the data communication RF link by
authentication protocol proposed under the EPC C1G2 specification, the pad generation functions are used to
protect the Apwd with cover coding against exposure. In this paper, the Pad generation function strengthen the
security of the mutual authentication scheme. The Pad generation functions based on XOR operation and in
association with the Apwd and Kpwd are used to generate the PAD1 and PAD2. Each cover-coding pad then
used to perform the subsequent authentication responses. In conclusion, the main feature of this approach is to
design pad generation mutual authentication protocol for secure data communication RF link.
References
[1]. Class 1 Generation 2 UHF Air interface Protocol Standard. [Online]. Available: http://www.epcglobalinc.org/sta
[2]. H. M. Sun and W. C. Ting, A Gen2-based RFID authentication protocol for security and privacy, IEEE Trans. Mobile Comput.,
vo8,no.8,Aug.2009,1052–1062.
[3]. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, Practical attacks on a mutual authentication
scheme under the EPC Class-1 Generation-2 standard, Comput Commun., vol.32, no.7–10, May 2009, 1185–1193.
[4]. D. M. Konidala, Z. Kim, and K. Kim, A simple and cost effective RFID tag–reader mutual authentication scheme, in Proc. Int. Conf.
RFID Sec, Jul.2007, 141–152.
[5]. Y.J. Huang, C.C. Yuan, M. K. Chen, W. C. Lin, and H. C. Teng, Hardware implementation of RFID mutual authentication protocol,
IEEE Trans. Ind. Electron., vol. 57, no. 5, May 2010, 1573–1582.
[6]. H.-Y. Chien, SASI: A new ultra lightweight RFID authentication protocol providing strong authentication and strong integrity, IEEE
Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 337–340, Oct.–Dec. 2007.
[7]. H. Tanaka, K. Ohnishi, H. Nishi, T. Kawai, Y. Morikawa, S. Ozawa, and T. Furukawa, Implementation of bilateral control system
based on acceleration control using FPGA for multi-DOF haptic endoscopic surgery robot, IEEE Trans. Ind. Electron., vol. 56, no. 3,
Mar. 2009, 618–627.
[8]. J. U. Cho, Q. N. Le, and J. W. Jeon, An FPGA-based multiple-axis motion control chip, IEEE Trans. Ind. Electron., vol. 56, no. 3,
Mar. 2009, 856–870.
[9]. M.-H. Lee, K.-K. Shyu, P.-L. Lee, C.-M. Huang, and Y.-J. Chiu, Hardware implementation of EMD using DSP and FPGA for online
signal processing, IEEE Trans. Ind. Electron., vol. 58, no. 6, Jun. 2011, 2473–2481.
[10]. P. Cole and D. Ranasinghe, Eds., Networked RFID Systems Lightweight Cryptography — Raising Barriers to Product
Counterfeiting (1st e Berlin, Germany: Springer-Verlag, 2008).
[11]. S. Piramuthu, Lightweight cryptographic authentication in passive RFID-tagged systems, IEEE Trans. Syst., Man, Cybern. C,
Appl. Rev. ,vol. 38, no. 3, May 2008, 360–376.

More Related Content

What's hot

VoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic System
VoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic SystemVoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic System
VoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic SystemSagun Man Singh Shrestha
 
Verification of uart ip core using uvm
Verification of uart ip core using uvmVerification of uart ip core using uvm
Verification of uart ip core using uvmeSAT Publishing House
 
64bit SMP OS for TILE-Gx many core processor
64bit SMP OS for TILE-Gx many core processor64bit SMP OS for TILE-Gx many core processor
64bit SMP OS for TILE-Gx many core processorToru Nishimura
 
Imx53 uart- GUIDE BOOK
Imx53 uart- GUIDE BOOKImx53 uart- GUIDE BOOK
Imx53 uart- GUIDE BOOKShahrukh Javed
 
Mridul_Verma_Intern_Tech_Adityaa_UART
Mridul_Verma_Intern_Tech_Adityaa_UARTMridul_Verma_Intern_Tech_Adityaa_UART
Mridul_Verma_Intern_Tech_Adityaa_UARTMridul Verma
 
FOSOH-V (TM) preliminary schematics
FOSOH-V (TM) preliminary schematicsFOSOH-V (TM) preliminary schematics
FOSOH-V (TM) preliminary schematicsAli Uzel
 
Technical Proposal - IP Telephony
Technical Proposal - IP Telephony Technical Proposal - IP Telephony
Technical Proposal - IP Telephony wolfthrone
 
BlueOptics X2 to SFP+ Converter 10Gigabit
BlueOptics X2 to SFP+ Converter 10GigabitBlueOptics X2 to SFP+ Converter 10Gigabit
BlueOptics X2 to SFP+ Converter 10GigabitCBO GmbH
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructurewolfthrone
 
Uart VHDL RTL design tutorial
Uart VHDL RTL design tutorialUart VHDL RTL design tutorial
Uart VHDL RTL design tutorialNabil Chouba
 
LINUX RS232程式設計
LINUX RS232程式設計LINUX RS232程式設計
LINUX RS232程式設計艾鍗科技
 
Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...
Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...
Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...Embarcados
 

What's hot (20)

VoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic System
VoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic SystemVoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic System
VoCoRoBo: Remote Speech Recognition and Tilt Sensing Multi-Robotic System
 
Verification of uart ip core using uvm
Verification of uart ip core using uvmVerification of uart ip core using uvm
Verification of uart ip core using uvm
 
64bit SMP OS for TILE-Gx many core processor
64bit SMP OS for TILE-Gx many core processor64bit SMP OS for TILE-Gx many core processor
64bit SMP OS for TILE-Gx many core processor
 
Serial communication of microcontroller 8051
Serial communication of microcontroller 8051Serial communication of microcontroller 8051
Serial communication of microcontroller 8051
 
Imx53 uart- GUIDE BOOK
Imx53 uart- GUIDE BOOKImx53 uart- GUIDE BOOK
Imx53 uart- GUIDE BOOK
 
Naveen UART BATCH 43
Naveen UART BATCH 43Naveen UART BATCH 43
Naveen UART BATCH 43
 
NAVEEN UART BATCH 43
NAVEEN UART BATCH 43NAVEEN UART BATCH 43
NAVEEN UART BATCH 43
 
SCI F28x
SCI F28xSCI F28x
SCI F28x
 
Mridul_Verma_Intern_Tech_Adityaa_UART
Mridul_Verma_Intern_Tech_Adityaa_UARTMridul_Verma_Intern_Tech_Adityaa_UART
Mridul_Verma_Intern_Tech_Adityaa_UART
 
3D-DRESD ASIDA
3D-DRESD ASIDA3D-DRESD ASIDA
3D-DRESD ASIDA
 
Flash Programming F28x
Flash Programming F28xFlash Programming F28x
Flash Programming F28x
 
FOSOH-V (TM) preliminary schematics
FOSOH-V (TM) preliminary schematicsFOSOH-V (TM) preliminary schematics
FOSOH-V (TM) preliminary schematics
 
Technical Proposal - IP Telephony
Technical Proposal - IP Telephony Technical Proposal - IP Telephony
Technical Proposal - IP Telephony
 
BlueOptics X2 to SFP+ Converter 10Gigabit
BlueOptics X2 to SFP+ Converter 10GigabitBlueOptics X2 to SFP+ Converter 10Gigabit
BlueOptics X2 to SFP+ Converter 10Gigabit
 
Technical Proposal - IT Infrastructure
Technical Proposal - IT InfrastructureTechnical Proposal - IT Infrastructure
Technical Proposal - IT Infrastructure
 
SDH ALARMS
SDH ALARMSSDH ALARMS
SDH ALARMS
 
Uart VHDL RTL design tutorial
Uart VHDL RTL design tutorialUart VHDL RTL design tutorial
Uart VHDL RTL design tutorial
 
Interrupt system f28x
Interrupt system f28xInterrupt system f28x
Interrupt system f28x
 
LINUX RS232程式設計
LINUX RS232程式設計LINUX RS232程式設計
LINUX RS232程式設計
 
Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...
Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...
Webinar Keysight: Soluções de Teste para Tecnologias Emergentes 5G-NR e IoT-L...
 

Viewers also liked

Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computingIOSR Journals
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking IOSR Journals
 
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...IOSR Journals
 
Vitality of Physics In Nanoscience and Nanotechnology
Vitality of Physics In Nanoscience and NanotechnologyVitality of Physics In Nanoscience and Nanotechnology
Vitality of Physics In Nanoscience and NanotechnologyIOSR Journals
 
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.IOSR Journals
 
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предпринимателиIOSR Journals
 

Viewers also liked (20)

O13040297104
O13040297104O13040297104
O13040297104
 
A017140105
A017140105A017140105
A017140105
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
M010226367
M010226367M010226367
M010226367
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking
 
G010134859
G010134859G010134859
G010134859
 
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
 
Vitality of Physics In Nanoscience and Nanotechnology
Vitality of Physics In Nanoscience and NanotechnologyVitality of Physics In Nanoscience and Nanotechnology
Vitality of Physics In Nanoscience and Nanotechnology
 
G010324854
G010324854G010324854
G010324854
 
E0562326
E0562326E0562326
E0562326
 
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
 
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
 
L010127578
L010127578L010127578
L010127578
 
I012255862
I012255862I012255862
I012255862
 
H012434257
H012434257H012434257
H012434257
 
I012144551
I012144551I012144551
I012144551
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предприниматели
 
D010121923
D010121923D010121923
D010121923
 
C017331720
C017331720C017331720
C017331720
 
N0121398105
N0121398105N0121398105
N0121398105
 

Similar to Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link

Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences forIAEME Publication
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3GOptimized architecture for SNOW 3G
Optimized architecture for SNOW 3GIJECEIAES
 
Synthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft CoreSynthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft Coreijsrd.com
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
 
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyIAEME Publication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Design and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaDesign and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaIAEME Publication
 
Efficient Design of Transceiver for Wireless Body Area Networks
Efficient Design of Transceiver for Wireless Body Area NetworksEfficient Design of Transceiver for Wireless Body Area Networks
Efficient Design of Transceiver for Wireless Body Area NetworksIOSR Journals
 
Security Enhancement in Networked Embedded System
Security Enhancement in Networked Embedded System Security Enhancement in Networked Embedded System
Security Enhancement in Networked Embedded System IJECEIAES
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Robotic Project - published paper
Robotic Project - published paperRobotic Project - published paper
Robotic Project - published paperRobert Rosier
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 

Similar to Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link (20)

Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences for
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3GOptimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
Synthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft CoreSynthesis & FPGA Implementation of UART IP Soft Core
Synthesis & FPGA Implementation of UART IP Soft Core
 
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...
 
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Design and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaDesign and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpga
 
A0220105
A0220105A0220105
A0220105
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
Jy3717961800
Jy3717961800Jy3717961800
Jy3717961800
 
Efficient Design of Transceiver for Wireless Body Area Networks
Efficient Design of Transceiver for Wireless Body Area NetworksEfficient Design of Transceiver for Wireless Body Area Networks
Efficient Design of Transceiver for Wireless Body Area Networks
 
Security Enhancement in Networked Embedded System
Security Enhancement in Networked Embedded System Security Enhancement in Networked Embedded System
Security Enhancement in Networked Embedded System
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Robotic Project - published paper
Robotic Project - published paperRobotic Project - published paper
Robotic Project - published paper
 
Co35503507
Co35503507Co35503507
Co35503507
 
My paper
My paperMy paper
My paper
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 

Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 5, Issue 5 (Mar. - Apr. 2013), PP 51-55 www.iosrjournals.org www.iosrjournals.org 51 | Page Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link Ramya K1 , Asst.Prof Priyadarshini G2 1 ( Department of ECE, Mount Zion College of Engineering & Technology, Tamil Nadu, India) 2( Department of ECE, Mount Zion College of Engineering & Technology, Tamil Nadu, India) Abstract: In RF link, without security the messages exchange between the two devices are monitoring by an eavesdropper. So the exclusive-OR (XOR) based pad generation protocol is used to safely transfer the data to the other point with necessary security and it maintaining confidentiality. This protocol produce the cover coding pad to mask the access password before the datas are transmitted. A specially designed pad generation will be implemented in digital domain to solve the insecurity problem in data communication RF link. This protocol developed under regulation of ISO 18000 – 6 type C protocol also known as EPC C1G2 RFID protocol. The linear feed back shift register (LFSR) generate the pseudo random binary sequence (PRBS) and it is used as data source to the pad generation function. The Xilinx 13.x software is used for synthesize and modelsim SE6.0 is used for simulating the result. The pad generation algorithm has been implemented in FPGA Spartan 3 PQ208-4 board to verify the result. Keywords- Field-programmable gate array (FPGA) implementation, mutual authentication, RF link, security, Zigbee. I. Introduction Radio Frequency Identification (RFID) technology uses a wireless system that can provide efficient real-time device track-and-trace capability. The ultra high frequency (UHF) RF for data communication using devices operating in industrial-scientific-medical (ISM) band. The EPC global Inc. is the leader in developing industry-driven specifications for the electronic product code (EPC) to support the use of RFID in supply chain management [1].The international standard organization (ISO) has incorporated the EPC class-1 generation-2 (C1G2) UHF standard into its ISO/IEC 18000-6 amendment type C. The ISO 18000-6C protocol also known as EPC C1G2 protocol, provides only basic security tools using a16-b pseudo random number generator and 16-b cyclic redundancy code. However, the EPC C1G2 specification do not fully support privacy invasion and data security issues [2]. A passive eavesdroppers monitoring the message exchange between the sender and the receiver by simply computing an exclusive-OR (XOR) operation [3]. To exposed this weakness a proposed sender and receiver (tag- reader) mutual authentication scheme protect the access password [4]. But after simple computations an attacker could acquire the access password (Apwd) and kill password (Kpwd) with high probability [4]. Many light weight authentication protocols that use only efficient bitwise operations like XOR, AND, OR etc, have been proposed [5]. However, most of the proposed protocols have not been verified with hardware [2]. The Field programmable gate array (FPGA)-based systems gain particular flexibility for verifying hardware implementations. Due to the advantages of FPGA prototyping based verification, a large number of systems have been implemented in FPGAs in different fields, such as radio communication protocol [6], robotics [7], [8], power system [9] and signal processing [10]. PRBS is generated using the linear feed back shift register and it is the data source to the pad generation function. Pad generation function produce the cover coding pad to mask the access password. The design of X-OR based pad generation protocols achieving the mutual authentication between the sender and the receiver. This protocol providing an adequate security for data communication RF link. An efficient hardware implementation of X-OR based pad generation mutual authentication protocol is described in this paper. This paper is organized in the following way. In section II LFSR functions and In section III pad generation operations are designed and provided. In section IV the implementation design of the pad generation protocol in FPGA is provided and discussed. In section V simulation and schematic results are presented and discussed. Finally, this paper is concluded in section VI. II. Linear Feed Back Shift Register Function The pad generation (PadGen) function is the key function used to produce cover-coding pad to mask the access password before transmission. The implementation of the PadGen function also requires the random number generator to produce RTx and RMx. A typical linear feedback shift register (LFSR) is used to generate pseudo random numbers (2N -1). A Linear Feedback Shift Register (LFSR) is a shift register whose input bit is
  • 2. Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link www.iosrjournals.org 52 | Page a linear function of its previous state. Mostly used linear function of single bits is XOR, thus normally it is a shift register whose input bit is driven by the exclusive-or (XOR) of some bits of the overall shift register value. The initial value of the LFSR is called the seed, and because the operation of the register is deterministic, the stream of values produced by the register is completely determined by its current (or previous) state. Likewise, because the register has a finite number of possible states, it must eventually enter a repeating cycle. An LFSR with an ell-chosen feedback function can produce a sequence of that appears random and has a very long cycle. For an n-bit LFSR, the LFSR can generate a (2N − 1)-bit long pseudo random sequence before repeating. A maximum-length LFSR produces an m-sequence (i.e., cycles through all possible 2N − 1 states within the shift register except the state where all bits are zero). In this paper, the parallel load count PRBS was implemented because it is more suitable for hardware implementation. III. Xor Based Pad Generation Operation An access password is required before data are exchanged between a sender and a receiver. The access password is a 32-b value. Konidala uses a specially designed pad generation function to produce the cover coding pad to mask the access password before the data are transmitted [4].The main problem with the scheme is infact if that inputs in the pad generation are known to an eavesdropper and this information can be used to obtain correlations to recover the access password under a correlation attack[3].To mitigate this drawback, the inputs to the pad generation function must be hidden from the eavesdropper. So, this is done by X-OR pad generation mutual authentication protocol .The detailed steps of the XOR schemes to generate the Pad generation function are presented as follows. Lets us represent the 32-b Apwd and Kpwd as Apwd = a0a1a2 ………..a30a31 (base 2) (1) Kpwd = k0k1k2 ………..k30k31 (base 2) (2) The 16-b random numbers are represent as input in below RTx = ht1ht2ht3ht4 (base 16) = dt1dt2dt3dt4 (base 10) (3) RMx = hm1hm2hm3hm4 (base 16) = dm1dm2dm3dm4 (base 10) (4) Apwd-PadGen (RTx, RMx) = adt1adt2adt3adt4||adt1+16adt2+16adt3+16adt4+1||adm1adm2adm3adm4||adm1+16adm2+16adm3+16adm4+16 = dV 1dV 2dV 3dV 4 (base 10) = RV (5) RT⨁RM= RT⨁M = dx1dx2dx3dx4 (6) Apwd-PadGen (RT, RT⨁M) = adt1adt2adt3ad4||adt1+16adt2+16adt3+16adt4+16×||adx1adx2adx3adx4||adx1+16adx2+16adx3+16adx4+16 = dW1dW2dW3dW4 (base 10) = RW (7) Kpwd-PadGen(RV,RW) =kdV1kdV2kdV3kdV4||kdV1+16kdV2+16kdV3+16kdV4+16×||kdW1+kdW2+kdW3+kdW4×||kdW1+16kdW2+16kd W3+16kdW4+16 = hq1hq2hq3hq4 (base 16) = PAD1 (8) RV⨁RW = RV⨁W = ds1ds2ds3ds4 (9) Kpwd-PadGen (RV, RV⊕W) =kdV1kdV2kdV3kdV4||kdV1+16kdV2+16kdV3+16kdV4+16×||kds1kds2kds3kds4×||kds1+16kds2+16kds3+ 16 kds4+16 = hr1hr2hr3hr4 (base 16) = PAD2 (10) By performing XOR operation the following cover-code Apwd is obtained CCPwdM1 = ApwdM ⨁ PAD1 (11) C CPwdL1 = ApwdL ⨁ PAD2 (12) For the Pad generation proposed by Konidala et al. [4] , each PAD function is computed based on one set of (RTx, RMx), which is transmitted in the open space. In contrast to the PadGen proposed by Konidala et al.,
  • 3. Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link www.iosrjournals.org 53 | Page the present proposed pad function is computed based on one set of (RV, RW), which is not transmitted openly. RV and RW are computed based on Apwd–PadGen (RTx, RMx) and Apwd-PadGen (RTx, RTx ⨁ RMx), respectively. PAD1 and PAD2 are then generated by Kpwd-PadGen (Rv, Rw) and Kpwd-PadGen (RV, RV ⨁ RW), respectively. XOR Register XOR RM_Register 3 to 2 MUX RT_RegisterRTX Register 2 Register 1 Control 2 to 1 MUX RT /16 /16 /16 RM RV /16 /16 PAD GEN RW Apwd/16 PAD 1 /16 PAD 2 /16 Kpwd/16 /16 RMX /16 RT /16 1 to 2 MUX Figure 1 Functional block diagram of the XOR pad generation operation IV. Design And Hardware Implementation The proposed system block diagram of Transmitter and receiver is respectively shown in ―Fig. 2‖ and ―Fig. 3‖.The proposed system working principles and detailed description is given below. The datas are transmitted with secure manner by Xor pad generation (PadGen) protocol. Here, pad generation protocol produce cover coding pad to mask the access password and FPGAs are chosen for implementation. Zigbee is the RF transreceiver to transmit and receive the data. Figure 2 Block diagram of transmitter The FPGAs running with 4MHZ clock. First we generate the parallel load PRBS by using LFSR and then result is given to the data mapping unit to converts the serial output came from the LFSR to parallel form, then it is given as the input to the pad generator. Universal trigger/control unit control each module in the implementation. Then generated PAD is convert into serial which is suitable for RF transmission and it is transmitted through RS 232 to the communication transmitter circuit, Here this communication transmitter circuit has Zeener diode as a regulator. The outcoming pads is transmitted through the zigbee in the RF link. The transmitted data through the RF link is received by the Zigbee in the receiver side and then it is given to communication receiver circuit which has LM317 regulator. The received data is transfer to the pad degenerator through the Data demapper unit. Finally, In the receiver side the obtained cover coding pad is degenerated by
  • 4. Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link www.iosrjournals.org 54 | Page pad degenerator. It is verified and displayed through LCD display, then error is calculated by Bit error calculator therefore if it has an error it will be displayed through the 7- segment display. Figure 3 Block diagram of receiver V. Results And Discussions The Verilog schematic and simulation results of FPGA implementation are shown in ―Fig. 4.a & Fig 4.b‖ and ―Fig. 5‖ respectively. Initially the 4-MHZ synchronous clock is applied to the FPGA board. The master clock and start_in are given as the input to the LFSR. Initially start_in is in‗0‘ then output is zero, If start_in is ‗1‘ then PRBS starts to generate. The generated PRBS output is nothing but the random number (RTX and RMX).The random number is given as the input to the XOR based pad generation function. The functional block diagram of the XOR-PadGen function for mutual authentication is described in the previous section as shown in ―Fig. 1‖. This approach can obtain PAD1 and PAD2 using one set of (RTx, RMx). This approach is a more efficient way to generate PAD function for mutual authentication. After the initial input of random numbers RTx and RMx, a multiplexer was utilized to control the selection of Apwd or Kpwd for PadGen operation. PAD1 and PAD2 are then simultaneously generated to cover-coded Apwd for mutual authentication. As shown in ―Fig. 1‖, the details of the functions performed are described as follows.  Apwd-PadGen (RTx,RMx)=dv1dv2dv3dv4=RV. RTx, RMx, and Apwd are selected as the inputs for PadGen operation and the calculation results RV by XOR-PadGen operation are stored in register for further manipulation.  Apwd-PadGen (RT,RT⨁RM)=dw1dw2dw3dw4= RW. Through mux selection, RT, (RT⨁RM), and Apwd are chosen as inputs for PadGen operation. The calculation result RW is stored in register for further computation.  Kpwd-PadGen (RV,RW)= hq1hq2hq3hq4 = PAD1. The PAD1 as shown in can then be obtained by mux selecting RV, RW, and Kpwd as inputs for XOR-PadGen operation.  Kpwd-PadGen(RV,RV ⨁ RW)=hr1hr2hr3hr4=PAD2. Similarly, the PAD2 can then be obtained using RV,RV⨁RW, along with Kpwd for XOR-PadGen operation. Simulations of the design were conducted in the modelsim SE 6.0. The verified Verilog code will be then downloaded on an Virtex Spartan 3 PQ208-4 board. FPGA running with a 4-MHz clock to verify the hardware. The simulated result of XOR pad generation protocol is shown below in ―Fig.5‖. Figure 4.a Figure 4.b
  • 5. Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link www.iosrjournals.org 55 | Page Figure 4.a & 4.b RTL Schematic diagrams of xor pad generation Figure 6 Verilog simulation result of xor pad generation VI. Conclusion This research work is to improve the security level of the data communication RF link by authentication protocol proposed under the EPC C1G2 specification, the pad generation functions are used to protect the Apwd with cover coding against exposure. In this paper, the Pad generation function strengthen the security of the mutual authentication scheme. The Pad generation functions based on XOR operation and in association with the Apwd and Kpwd are used to generate the PAD1 and PAD2. Each cover-coding pad then used to perform the subsequent authentication responses. In conclusion, the main feature of this approach is to design pad generation mutual authentication protocol for secure data communication RF link. References [1]. Class 1 Generation 2 UHF Air interface Protocol Standard. [Online]. Available: http://www.epcglobalinc.org/sta [2]. H. M. Sun and W. C. Ting, A Gen2-based RFID authentication protocol for security and privacy, IEEE Trans. Mobile Comput., vo8,no.8,Aug.2009,1052–1062. [3]. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard, Comput Commun., vol.32, no.7–10, May 2009, 1185–1193. [4]. D. M. Konidala, Z. Kim, and K. Kim, A simple and cost effective RFID tag–reader mutual authentication scheme, in Proc. Int. Conf. RFID Sec, Jul.2007, 141–152. [5]. Y.J. Huang, C.C. Yuan, M. K. Chen, W. C. Lin, and H. C. Teng, Hardware implementation of RFID mutual authentication protocol, IEEE Trans. Ind. Electron., vol. 57, no. 5, May 2010, 1573–1582. [6]. H.-Y. Chien, SASI: A new ultra lightweight RFID authentication protocol providing strong authentication and strong integrity, IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 337–340, Oct.–Dec. 2007. [7]. H. Tanaka, K. Ohnishi, H. Nishi, T. Kawai, Y. Morikawa, S. Ozawa, and T. Furukawa, Implementation of bilateral control system based on acceleration control using FPGA for multi-DOF haptic endoscopic surgery robot, IEEE Trans. Ind. Electron., vol. 56, no. 3, Mar. 2009, 618–627. [8]. J. U. Cho, Q. N. Le, and J. W. Jeon, An FPGA-based multiple-axis motion control chip, IEEE Trans. Ind. Electron., vol. 56, no. 3, Mar. 2009, 856–870. [9]. M.-H. Lee, K.-K. Shyu, P.-L. Lee, C.-M. Huang, and Y.-J. Chiu, Hardware implementation of EMD using DSP and FPGA for online signal processing, IEEE Trans. Ind. Electron., vol. 58, no. 6, Jun. 2011, 2473–2481. [10]. P. Cole and D. Ranasinghe, Eds., Networked RFID Systems Lightweight Cryptography — Raising Barriers to Product Counterfeiting (1st e Berlin, Germany: Springer-Verlag, 2008). [11]. S. Piramuthu, Lightweight cryptographic authentication in passive RFID-tagged systems, IEEE Trans. Syst., Man, Cybern. C, Appl. Rev. ,vol. 38, no. 3, May 2008, 360–376.