SlideShare a Scribd company logo
1 of 17
Download to read offline
International JournalElectronics and Communication Engineering & Technology (IJECET),
  International Journal of of Electronics and Communication
Engineering 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME
  ISSN 0976 –
                 & Technology (IJECET)                                    IJECET
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online)
Volume 1, Number 1, Sep - Oct (2010), pp. 71-87                         ©IAEME
© IAEME, http://www.iaeme.com/ijecet.html


     A RANDOM NUMBER GENERATOR FOR RFID TAGS
                                        Mala Mitra
                  Department of Electronics and Communication Engineering
                   PES School of Engineering, Hosur Road, Electronic City
                        Bangalore, Email: mala_2001_in@yahoo.com

  ABSTRACT
          In this paper, a true random number generator based on a simple circuit is
  proposed. The circuit consists of an operational amplifier with a positive feedback. It is a
  Schmitt trigger circuit without any applied input signal. A Schmitt trigger circuit gives a
  positive saturated output voltage +Vsat or negative saturated output voltage -Vsat
  depending on the differential input is negative or positive at the instant of power supply
  switch on. In the presence of any input signal the output state changes at the crossing of
  either the upper trigger point or the lower trigger point. In absence of any input signal the
  input shall be governed by resultant thermal noise voltage of the resistors present at the
  input. It shall be set at one level either +Vsat /bit 1 or -Vsat /bit 0 depending on the polarity
  of the differential input thermal noise. Instead of constant supply voltages to bias the
  operational amplifier clock pair may be used. The polarity of the thermal noise voltage of
  the resistors present at the input at the instant of rising/falling edge of the clock pair
  decides the polarity of the output pulses. Since polarity of thermal noise voltage is
  random the output bit-pattern of 1 and 0 is also random. The output bits are in polar RZ
  format with no dc component. Results show that, the output passes the NIST test directly.
  No further randomization of the output bits or input voltage control is required. The
  proposed random number generator is suitable for RFID tag security and privacy
  algorithms as the random number generator is very robust to noise, thermal and power
  attacks prevalent in RFID systems. The simple circuit proposed here can be implemented
  in existing popular embedded systems for RFID tags e.g. MSP430 microcontroller or
  WISP.




                                                 71
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


Keywords: Johnson noise, NIST test, Operational amplifier, Schmitt trigger, Security
and privacy of RFID systems.
INTRODUCTION
        RFID is a low-cost solution for object identification. Some of the typical
applications are supply chain management, access control, library management, smart
appliances etc. [1, 2]. As technology advances, RFID is penetrating more and more in our
everyday life. For more widespread applications and to make these systems more popular
the security and privacy of the system must be enhanced [3, 4]. An RFID tag sends an
Electronic Product Code or EPC for the object to which it is tagged. It gives information
about the object class and a unique identification number to any interrogator. This may
create a privacy problem.
        For instance, an RFID tag can be impregnated on little Alice. While Alice plays
alone in her wonderland her parents can keep track of her using a RFID detector. Even if
Alice hides behind a bush the EPC code from the tag can be read by the detector as RFID
system does not need any Line of Sight (LOS) operation. But the problem is, the tag on
Alice responds to any detector that conforms to the standard. An adversary can use her
detector and by reading the object class can find out all the kids with RFID tags in the
vicinity. A kidnapper may track little Alice with the identity number available in the EPC
code. This may help to concoct a kidnap plan. Further after knowing the EPC code a tag
can be cloned with the same code. The cloned tag can be used for misguiding the parents
after a kidnap. The transmission from the original impregnated tag on Alice can be
prevented by a metal shield.
        Standard encryption algorithms e.g. RSA, ECC [5, 6] cannot protect against
tracking and cloning. After standard encryption a tag shall send the same encrypted EPC
for any interrogation by any detector. An adversary can track an object or a person by the
encrypted EPC. No knowledge of the secret key is needed. With the encrypted EPC, tags
may be cloned. In case of RFID tag, the encryption algorithm should give different
cipher-text or encrypted EPC for each enquiry. However, the authentic interrogator
should have some secret information or a key to decrypt and get the unique EPC in every
interrogation. Without this secret key the adversary shall not be able to track the tag as



                                               72
International Journal of Electronics and Communication Engineering & Technology (IJECET),
 ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


 each time her detector receives an apparently random number. Many algorithms have
 been proposed in recent days to prevent tracking and cloning. Most of the advanced
 algorithms use random numbers to randomize the cipher-text [7, 8].
         Many random number generators (RNGs) have been proposed in the past and in
 recent times [9 - 28]. Some of them are quite fit to serve a specific application e.g.
 genetic algorithm [21], cryptography [10], random frequency hopping in a spread
 spectrum communication system [22]. These technologies cannot be directly
 implemented for RFID tags as RNG of an RFID tag must have some special features.
 Some of the special requirements of the RNG for an RFID tag are listed below.
I. Robust to Thermal Attacks:
         RFID tags and so the RNG must work for a varying working environment.
 Thermal attack where an adversary deliberately changes the tag temperature to get
 predictable data is quite possible. However, any RNG may fail beyond a certain range of
 temperature. It is to be noted that attack usually takes place when a human carries the tag.
 A human being feels uncomfortable when the temperature deviates abruptly by ± 15 0C
 from the normal. In such situation the tag can be made inoperable with a metal film
 cover. Within the comfortable temperature range the RNG should deliver unpredictable
 data. Tokunaga et al. and Bellido et al [11, 23] utilized thermal noise voltage as input to a
 meta-stable system. It was shown that at meta-stable point deterministic noise is less
 when the resolution time of the output bit is high and the output bits from the system can
 be considered as random. This meta-stable point is very sensitive to input bias, which in
 its turn changes with ambient temperature. A control system brings the system back to a
 meta-stable point if resolution time is below threshold. With a thermal attack before the
 control system works initial bits may get predictable. As a measure, bits are dropped
 when resolution time is low. But measured resolution time is an average for 128 bits. The
 attack may happen for less number of bits maintaining the average resolution time at a
 satisfactory level.
II. Robust to Power Attacks:
         The random number generator should be robust against power attacks. Most of
 the RFID tags are passive or battery-less. Those utilize the detector power. An adversary



                                                73
International Journal of Electronics and Communication Engineering & Technology (IJECET),
  ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


  may deliberately transmit less power from the detector. The tag RNG may generate same
  bit 0 or predictable bits when it is power hungry or supply voltage or current to the circuit
  is low. This attack has been demonstrated for Philips Mifare tags [29].
          In many of the RNGs randomness is decided by the clock jitter or time difference
  between a clock pair. In a passive RFID tag instead of generation of clock pair the
  transmitted pulse train from the detector can be utilized. In that case, the time difference
  or clock jitter information is also available in the detector and the random number
  produced is known to adversary [15].
III.Lightweight:
          RNG and the RFID tag containing it must be lightweight. In most of the cases the
  strategies used for RNGs give pseudo-random numbers. Additional circuits are used to
  further randomize it. This takes additional chip area and the RNG no longer remains
  lightweight. One of the strategies for RNG is to utilize thermal noise voltage as it is
  known as one of the best sources of random noise. Since amplitude of noise voltage is
  very low efforts were made to amplify it [20, 24]. In the process of amplification, the
  voltage gets corrupted by deterministic noise generated in the amplifier. Also the finite
  bandwidth of the amplifier makes the output colored though there is random or white
  noise at the input. Further randomization is done with additional hardware. This
  consumes additional Si area. For superconductive RNG in SFQ circuits [10] the circuit is
  very sensitive to low thermal noise voltage and further magnification is not required.
  However, maintenance of superconductive temperature is beyond the scope of a portable
  lightweight device e.g. RFID.
IV.No Seed Value:
          RNGs that require seed values [15, 28, 30] are not suitable for RFIDs. In this
  automated system manual entry of seed value is not possible. If known parameters e.g.
  date or time is used to provide the seed value the unpredictability of the output pattern is
  lost. Most of the recent hardware RNGs do not need any seed value.
V.Intermittent Operation:
          In some RNGs e.g. continuous chaotic oscillator [9, 25], meta-stable system [11]
  initial few bits depend on the initial condition and are predictable. It quickly transforms



                                                 74
International Journal of Electronics and Communication Engineering & Technology (IJECET),
    ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


    to a state where generated data is unpredictable. For a continuously functioning generator
    the first few predictable bits can be discarded. A passive RFID tag goes for a deep sleep
    in absence of a detector and the available power. Generator should work satisfactorily as
    soon as it wakes up.
 VI.Qualify NIST Test Suite:
             The output should not follow any definite pattern. The adversary should not be
    able to predict the output by applying her knowledge. NIST test [31] has been accepted as
    the standard for unpredictability. The output should pass the NIST test.
    Apart from these essential features there are some desired features for RFID tags. These
    are listed below:
VII.Part of an Embedded System:
             There is an urgent need of secured RFID system. It is desirable that the RNG can
    be implemented on an embedded system that is already in use for tags e.g. MSP430 /
    WISP [32]. In that case, no extra component is needed for the development of tags to
    provide security or privacy.
    Si Chip Implementation: If embedded implementation is not feasible a fully tested
    light-weight IC that can be readily incorporated in the system is desirable.
VIII.Pulsating Voltage:
             It is desirable that the system consumes low power. As mentioned earlier, a
    passive tag utilizes detector power. Detector transmits power in the form of a pulse train.
    Rectifier and regulator circuits are required to convert this pulsating voltage to a stable dc
    supply. A part of this power is consumed in these circuits. It is desirable that an RNG can
    function with the pulsating voltage instead of stable dc supplies to minimize wastage of
    power.
    Table I and II show the suitability of recently proposed RNGs for RFID tags.




                                                   75
International Journal of Electronics and Communication Engineering & Technology (IJECET),
  ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


            Table 1 suitability of proposed random number generators for rfid tags
Refere        Basic Principle          Any particular      Robust    Lightweight   Intermitt   NIST Test
 nce                                    drawback             to                       ent       Results
                                                          Thermal                  Operatio
                                                          (T), and                     n
                                                           Power
                                                            (P)
                                                          Attacks
          Chaotic oscillator, time     Implementation                    No           No
         difference between clock         of off-chip
              pairs and further            oscillator
                                                           (T) Not
               randomization          inductance along-                                         17 out of
  [9]                                                      known
                                       with tag antenna                                            17
                                                           (P) No
                                          inductance
                                        without mutual
                                           coupling
 [10]     Thermal noise detection      Maintenance of        No          No          Not       1 out of 17
            in Superconductive         superconductive                              known
           Single Flux Quantum         temperature 4.2
                  Circuit                      K
 [11]      Meta-stability based                --            No          No           No         7 out of
               quality control                                                                     17*
 [12]     Chaos based generator               --            Yes          No           No        No result
 [13]      Meta-stability based       Too many              No           No           No        15 out of
               output control         reference                                                     17
                                      voltages to be
                                      converted from
                                      pulsating voltage
                                      in a passive
                                      RFID tag
 [14]     Clock jitter and further            --            Not          Yes         Yes        13 out of
                   chaos                                   known                                   17
 [15]         Rising edge time        (i) Generation of     No           Yes         Yes        Not done
          difference between two            a pair of
            independent clocks           independent
                                          clocks in a
                                        passive RFID
                                               tag.
                                          (ii) Further
                                         processing is
                                      affected by clock
                                      period variation.
                                       A time attack is
                                           possible.
 [16]     Chaos due to Bernoulli          Difficult to     (T) Yes       Yes         Yes       9 out of 17
             shift and further        implement on Si       (P) No
              randomization             due to process
                                           variation
 [17]        Random jitter in a          Nearby ring         Not         No          Yes       Not shown


                                                 76
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


         number of ring oscillators      oscillators get    known
         and further randomization     phase locked and
                                         randomness is
                                             less than
                                            expected
[19]      Random fluctuation of         Soft breakdown        No         Yes        No          Not shown
             current in a MOS               voltage is
            capacitor after soft            extremely
          breakdown and further            sensitive to
              randomization                fabrication
                                           process and
                                            operating
                                       temperature. Any
                                       fluctuation in the
                                         operating point
                                         may lead to no
                                          breakdown or
                                        hard breakdown.
[20]      Amplification of thermal          Amplifier       (T) Not       No        Yes           Not
         noise voltage of a resistor      degrades the      known                                 done
         and further randomization       randomness of      (P) No
                                       the thermal noise
                                              voltage
This       Saturation of thermal                             Yes         Yes        Yes         11 out of
work           noise voltage                                                                       17
   Table 2 suitability of proposed random number generators for rfid tags (continued)
                   Implemental in embedded processors                 Implemented    Pulsating
Reference
                                                                         on Si        Power
   [9]                             Not fully                              No            No
   [10]                            No                                    Partly           No
   [11]                            No                                    Partly           No
   [12]                        Yes, PSOC                                No need          Partly
   [13]                            No                                    Partly           No
   [14]                   Yes, Xilinx Vertex II                         No need           Yes
   [15]                      Yes, MSP430                                No need           No
   [16]                            No                                     No              No
   [17]        Yes, any FPGA. But consumes huge amount                    No              No
                              of hardware
   [19]                            No                                No                   No
   [20]                            No                              Partly                 No
   This                   Yes, MSP430, PSOC                       No need                 Yes
   work
In the next section the proposed circuit of this paper is discussed.




                                                  77
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


PROPOSED CIRCUIT
        The proposed circuit configuration is based on a Schmitt Trigger circuit [33] as
shown in Fig. 1. Schmitt trigger is a special configuration of operational amplifier where
positive feedback is used. When the input signal applied at negative input exceeds any of
the voltage limits namely upper trigger point or the lower trigger point, the output gets
saturated to negative or the positive saturation voltage respectively.




        Question that remains is: what will be the state of the output in absence of input
signal i.e. when the input voltage does not exceed any of the trigger points? Suppose the
supply voltage of the operational amplifier is switched on. The output will saturate to
either the positive or the negative value depending on the polarity of the difference
voltage at the inputs at the time of supply switch on. It will remain to this saturated value
as the input voltage does not exceed the trigger point. Instead of constant supply we can
apply clock and inverted clock at the positive and negative supply terminals of the
operational amplifier respectively as shown in Figure 1. The polarity of the output will be
decided by the polarity of the differential input voltage at the beginning of each pulse
pair. This input voltage can be given as:
Vin = Vtp − Vtn   ……………………………………………………                                    (1)

        Where, Vtp and Vtn are the random thermal noise voltage of the resistor or Johnson
noise at the non-inverting (marked as + in Figure 1) and inverting node (marked as – in



                                               78
International Journal of Electronics and Communication Engineering & Technology (IJECET),
  ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


  Figure 1) respectively. Since the polarity of the output is dependent only on the
  difference of two thermal noise voltages or Johnson noise voltages it is truly random. To
  satisfy this condition the output voltage Vout should become zero at the end of the off-
  state of the clock cycle. In the beginning of the on-state of the clock cycle there should
  not be any residual voltage Vor from the previous on-state of the clock cycle. If there is
  any Vor then its polarity will decide the polarity of Vin as well as Vout. In this case, the
  output will be of same signal level a string of all 1s or all 0s. For a fast clock there will be
  Vor. For a fast decay of the output at the off-state of the clock many circuit enhancement
  has been thought of. One of them is connection of an nmos / nFET with slightly negative
  threshold voltage e.g. -0.1 volt in between output and ground. The gate of the nFET
  should be connected to clk . In the off-state of the clock, gate voltage is 0 and the nFET
  should conduct. In the on-state, the gate voltage is negative and below threshold of the
  nFET so the nFET remains off.
          The simple circuit proposed here fulfils the requirement of an RNG for an RFID
  tag. These requirements are listed in Table I and discussed in Introduction section. The
  following gives the properties of the Proposed Circuit (PC) those make it suitable for an
  RFID tag.
 I. Robust to Thermal Attacks:
          Output bit in the PC depends upon the polarity of the input thermal voltage. Since
  variation in temperature does not change the polarity of the input the RNG is robust to
  thermal attacks. PC uses only an op-amp and resistors. These components work for a
  wide temperature range. For example, LM741, the op-amp used here, has an operating
  temperature range of -55 0C to 125 0C. If implemented on MSP430 microcontroller,
  during thermal attacks if the temperature goes beyond this range the in-built temperature
  sensor can be used to switch it off.
II. Robust to Power Attacks:
          PC uses a clock pair instead of constant supplies. If the clock pair amplitude is
  reduced the circuit will still remain functional.
III. Lightweight:
          PC output gives random bits that pass the NIST test. No further randomization is


                                                 79
International Journal of Electronics and Communication Engineering & Technology (IJECET),
    ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


    necessary. The simple circuit is very lightweight consisting of only one operational
    amplifier.
 IV. No Seed Value:
            PC is a true random number generator and does not need any seed value.
  V. Intermittent Operation:
            PC does not need any resolution time to get unpredictable data. Whenever clock
    pair is applied at the supply terminals of the operational amplifier random bits are
    produced.
 VI. Qualify NIST Test Suite:
            The tests suitable for small volume of data are done. All the tests are passed.
    From NIST test qualification point of view it can be said that, the RNG is unpredictable
    for this small volume of data.
VII. Part of an Embedded System:
            Since PC consists of only one operational amplifier it can be implemented easily
    in MSP430 from Texas Instruments or PSOC from Cypress Semiconductors.
VIII. Pulsating Voltage:
            PC does not need any constant power supply instead it functions with a clock pair
    as shown in Figure 1.
    RESULTS
            To study the behavior of the operational amplifier IC741 with a clock pair applied
    at the supply terminals simulation is done. The output voltage as given in Fig. 2 is
    simulated in TINA TI, a tool developed and supported by Texas Instruments. The clocks
    given as clk and clk are applied at negative and positive supply terminal of the
    operational amplifier respectively. In this simulator thermal noise voltage could not be
    applied at input. Instead a faster clock is applied at the inverting node marked as - in Fig.
    1. It can be observed that, the output voltage assumes -3 volts (or +3 volts) if input clock
    is +200 mV (or -200 mV) at the beginning of the on-state of the clocks. The output bit-
    stream is in polar RZ format with the advantage of no dc component [34].




                                                   80
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME




        The circuit given in Figure 1 has been implemented on a bread-board. 289 bits
have been collected. Some of the tests in NIST require 106 bits. Automatic data
acquisition set-up is not ready at this moment. So such an amount of data could not be
produced. Only those tests with recommended data size less than 289 are carried out.
Lempel Ziv test has not been done as it was deleted from the test suite in the latest
version 800-22b. The programs necessary for all the tests were written in MATLAB. The
programs were tested with standard data that give predictable p-values. The results for the
standard data are listed in Table IV. Table III shows the results for measured data. The p-
values show that all the tests were passed. So the proposed RNG is definitely
unpredictable for 289 data. For higher volume of data it is quite likely that it shall remain
unpredictable.




                                               81
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


                  Table 3 NIST 800-22b test results for measured data
Test                 Input size            Recommended           p value*
                                           Input Size
Frequency            Sample size, n=289 n>=100                   0.3776
(Monobit) Test       Sample size n=122                           1.0000
Frequency within a The length of each      M>20, M>0.01n,
block                block, M=96 .         N<100, n≥100          0.4821
                     The no. of blocks, N
                     =3.
                     Total sample size,
                     n= MN= 288.
Run                  Sample size, n=289 n≥100                    0.401573
Longest Run          Sample size, n=128. n             M         Set I 0.6889
                     Block length, M=8     128         8         Set II
                                           6272        128       0.9732
                                           750000 100000
Binary Matrix Rank No. of rows in each                           0.162297
                     matrix, M=2           N>= 38
                     No. of columns in
                     each matrix, Q=2
                     No. of matrices,
                     N=n/{MQ}=72
                     Total sample size,
                     n= 288
Non-Overlapping      No. of blocks, N=2, N≤100                   All p_values≥
Template Matching No. of data in each                            0.148207
                     block, M=144,
                     Template length,
                     m=6
Serial (m=2)         Sample size, n=289 m<log2n - 2              p value 1 = 0.888179,
                     Template size, m=2                          p value 2 =0.842701.
Serial (m=3)            Sample size, n=289       m<log2n - 2             p value 1 = 0.162805,
                        Template size, m=3                               p value 2 = 0.084058.
Approximate             Sample size, n=289       m<log2n - 2             p value= 0.453542
Entropy                 Template size, m=3
Cusum forward           Sample size, n=289       n≥100                   p value=1.000

Cusum reverse           Sample size, n=289       n≥100                   p value=1.000




                                               82
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


                     Table 4 NIST 800-22b test results for standard data
      Test                                p value for data pattern
                              All 0                        All 1                      1010--
 Frequency                 8.2120e-65                   8.2120e-65                    0.9531
   Monobit
 Frequency                    0.0000                         0.0000                   1.0000
within a block
     Run             No need of run test as          No need of run test as        8.15516e-65
                     monobit freq test fails         monobit freq test fails
                     |pai-0.5|=0.500000 >=           |pai-0.5|=0.500000 >=
                          tau=0.117647                    tau=0.117647
 Longest Run                  Set I:                          Set I:                  Set I:
                          1.5129X10-32                   4.85445X10-41            1.5129X10-32
                              Set II:                         Set II:                Set II:
                          1.5129X10-32                   4.85445X10-41            1.5129X10-32


Binary Matrix                 0.0000                      3.2371X10-28            3.2371X10-28
    Rank
    Non-                p value=0.000 for              p value = 0.000 for           p value =
 Overlapping                 template                        template                0.000 for
  Template                 000000000                       111111111                templates:
  Matching             p value = 0.145254              p value = 0.145254          010101010
                       for other templates             fot other templates         101010101
                                                                                     p value =
                                                                                     0.145254
                                                                                     for other
                                                                                    templates
 Serial (m=2)      p value 1 = 0,000, p value       p value 1 = 0.000, p value     p value 1 =
                           2 = 0.000                        2 = 0.000             0.000, p value
                                                                                     2 = 0.000
 Serial (m =3)     p value 1 = 0,000, p value       p value 1 = 0,000, p value     p value 1 =
                           2 = 0.000                        2 = 0.000             0,000, p value
                                                                                     2 = 0.000
 Approximate                  0.000                           0.000                    0.000
   Entropy
Cusum forward                 -1.000                         -1.000                   1.000
Cusum reverse                 -1.000                         -1.000                   1.000
CONCLUSION
        A random number generator suitable for RFID tags is proposed. The simple
circuit consists of an op-amp in the Schmitt trigger configuration. In-place of stable
power supplies to the op-amp terminals, clk and clk are applied. No signal is applied at


                                               83
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


the input instead the thermal noise voltage of the resistors at the input is allowed to
saturate and give the output as positive or negative saturation voltage. The circuit output
is simulated with the help of TINA TI. The circuit with a 741 op-amp is developed on a
bread-board. Measured output passes the NIST test.
        The simple circuit can be implemented on popular embedded processors for RFID
tags e.g. MSP430 or WISP. Design effort can be made to achieve a low power high speed
op-amp suitable for this purpose.
REFERENCES
1. A. Agarwal and M. Mitra (2006), RFID: Promises and Problems, Techonline.
    Available: http://www.techonline.com, Accessed on 12th Nov., 2009.
2. R. Das (2007), RFID Forecasts, Players & Opportunities 2007-2017, ED Online and
    IDTechEx.Available
    http://www.elecdesign.com/Articles/Index.cfm?ArticleID=14840&pg=3                        and
    http://www.idtechex.com/research/articles/rfid_forecasts_players_and_opportunities_
    2007_2017_00000521.asp, Accessed on 12th Nov., 2009.
3. A. Juels (2006), RFID Security and Privacy: A Research Survey, An invited paper,
    IEEE Journal on Selected Areas in Communications, vol. 24 no. 2, pp. 381-394.
4. S. Garfinkel, A. Juels, and R. Pappu (2005), RFID Privacy: An Overview of
    Problems and Proposed solutions, IEEE Security and Privacy, vol. 3 no. 3, pp. 34-43.
5. W. Stallings (2003), “Cryptography and Network Security: Principles and Practices”,
    Pearson Education, India.
6. D. R. Stinson (2002), “Cryptography Theory and Practice”, K. H. Rosen, Ed. CRC,
    New York,.
7. S. Yeo and J. Kwak (2007), Privacy Enhanced Authentication Protocol for RFID Tag
    System Security, IJCSNS, International Journal of Computer Science and Network
    Security, vol. 7 no. 9, pp. 1-6.
8. M. Mitra (2008), Privacy for RFID Systems to Prevent Tracking and Cloning,
    IJCSNS, International Journal of Computer Science and Network Security, IJCSNS,
    vol. 8 no.1, pp. 1 – 5. Digital Object Identifier 10.1109/MPOT.2007.913680.




                                               84
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


S. Ergun, and S. Ozoguz (2010), Truly Random Number Generators Based on Non-
      autonomous Continuous-time Chaos, International Journal of Circuit Theory and
      Applications, vol. 38, pp. 1-24, Wiley InterScience.
10.    Y. Yamanashi, N. Yoshikawa (2009), Superconductive Random Number Generator
      Using Thermal Noises in SFQ Circuits, IEEE Trans. Applied Superconductivity, vol.
      19,     no.   3,   part   1,   pp.    630     –    633,    Digital    Object     Identifier
      10.1109/TASC.2009.2019294
11.    C. Tokunaga, D. Blaauw, and T. Mudge (2008), True Random Number Generator
      with a Metastability-Based Quality Control, IEEE Journal of Solid-State Circuits, vol.
      43, no. 1, pp. 78 – 85.
12.    M. Drutarovsky, and P. Galajda (2007), A Robust Chaos-Based True Random
      Number Generator Embedded in Reconfigurable Switched-Capacitor Hardware,
      Radioengineering Journal, vol. 16, no. 3, pp. 120 – 127.
13.    J. Holleman, B. Otis, S. Bridges, A. Mitros (2007), C. Diorio; Proc. 32nd European
      Solid-State Circuits Conference, 2006. ESSCIRC 2006, pp. 134 – 137, Digital Object
      Identifier 10.1109/ESSCIR.2006.307549.
14.    S. H. M. Kwok, and E. Y. Lam (2006), FPGA-based High-speed True Random
      Number Generator for Cryptographic Applications, in Proc. 2006 IEEE Region 10
      Conference, TENCON 2006, 2006, pp. 1 – 4, Digital Object Identifier
      10.1109/TENCON.2006.344013.
15. L. Westlund (2006), Random Number Generation using the MSP430, Application
      Report, Texas Instruments. Available: http://focus.ti.com/lit/an/slaa338/slaa338.pdf
      Accessed on 1st July 2010
16.         T. Zhou, Z. Zhou, M. Yu, and Y. Ye (2006), Design of a Low Power High
      Entropy Chaos-Based Truly Random Number Generator, IEEE Asia Pacific
      Conference on Circuits and Systems, APCCAS 2006, pp.1955 – 1958.
17.         D. Schellekens, B. Preneel, and I. Verbauwhede (2006), FPGA Vendor Agnostic
      True Random Number Generator, IEEE International Conference on Field
      Programmable Logic and Applications, pp.1 – 6, Digital Object Identifier
      10.1109/FPL.2006.311206.



                                               85
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


18.      C. Liu and J. McNeill (2004), A Digital-PLL-Based True Random Number
      Generator, IEEE International Symposium on Circuits and Systems 2004, ISCAS (1),
      pp. 773 - 776, Vancouver, BC, Canada - Volume 1.
19.      S. Yasuda, H. Satake, T. Tanamoto, R. Ohba, K. Uchida, and S. Fujita (2004),
      Physical Random Number Generator based on MOS Structure after Soft Breakdown,
      IEEE Journal of Solid-State Circuits, vol. 39 no. 8, pp. 1375 – 1377. Digital Object
      Identifier 10.1109/JSSC.2004.831480
20.      M. Bucci, L. Germani, R. Luzzi, P. Tommasino, A. Trifiletti, and M.
      Varanonuovo (2003), A High-Speed IC Random-Number Source for SmartCard
      Microcontrollers, IEEE Transactions on Circuits and Systems-I: Fundamental Theory
      and Applications, vol. 50 no. 11, pp. 1373-1380.
21.      I. M. Bland, G. M. Megson (1996), Systolic Random Number Generation for
      Genetic Algorithms, Electronics Letters, vol. 32 no. 12, pp. 1069 – 1070.
22.      P. J. Pacini, and B. Kosko (1995), Adaptive Fuzzy Frequency Hopper, IEEE
      Transactions on Communications, vol. 43 no. 6, pp. 2111 – 2117.
23.      M. J. Bellido, A. J. Acosta, M. Valencia, A. Barriga; J. L. Huertas (1992), Simple
      Binary Random Number Generator, Electronics Letters, vol. 28 no. 7, pp. 617 – 618.
24. B. Jun and P. Kocher (1999), A white paper on The INTEL® Random Number
      Generator.     Available       http://www.cryptography.com/public/pdf/IntelRNG.pdf
      Accessed on 19th July 2010.
25.      G. M. Bernstein, and M. A. Lieberman (1990), Secure Random Number
      Generation using Chaotic Circuits, IEEE Transactions on Circuits and Systems, vol.
      37 no. 9, pp. 1157 – 1164.
26.      A. J.-Khalili, and D. M. Al-Khalili (1990), A Controlled Probability Random
      Pulse Generator Suitable for VLSI Implementation, IEEE Transactions on
      Instrumentation and Measurement, vol. 39 no. 1, pp. 168 – 174.
27.      J. L. Perry, R. W. Schafer, and L. R. Rabiner (1972), A Digital Hardware
      Realization of a Random Number Generator, IEEE Transactions on Audio and
      Electroacoustics, vol. AU-20 no. 4.
28.      Z. Gutterman, B. Pinkas, and T. Reinman (2006), Analysis of the Linux Random
      Number Generator, Proc. 2006 IEEE Symposium on Security and Privacy (S&P’06).


                                               86
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


29.      K. Nohl and H. Plotz (2008), 24C3 Mifare crypto1 RFID Completely Broken,
      Posted       by        E.        Phillips,       Wireless         hacks.         Available
      http://www.hackaday.com/2008/01/01/24c3-mifarecrypto1-rfid-completely-broken/
30.      D. E. Knuth (1981), The Art of Computer Programming, vol. 2, Semi numerical
      Algorithms. Addison-Wesley, Reading, MA.
31.      A. Rukhin, J Soto, J Nechvatal, M Smid, Elaine Barker, Stefan Leigh, M
      Levenson, M Vangel, D Banks, A Heckert, J Dray, and S Vo (2001), A statistical test
      suite for random and pseudorandom number generators for cryptographic
      applications, NIST Special Publication 800-22. Available csrc.nist.gov/RNG/SP800-
      22b.pdf.     http://csrc.nist.gov/publications/nistpubs/800-22-rev1/SP800-22rev1.pdf.
      Accessed on 12th Nov. 2009.
32.      H. Chae, D. J. Yeager, J. R. Smith, and K. Fu (2007), Maximalist Cryptography
      and Computation on the WISP UHF RFID Tag,. Conference on RFID Security.
33.      D. A. Bell (2007), “IC Operational Amplifiers and Basic Op-Amp Circuits”, in
      Electronic Devices and Circuits, pp. 493 – 497, Prentice Hall, India,.
34.      S. Haykin (1988), Digital Communications, pp. 234 – 242, Wiley India, New
      Delhi.




                                               87

More Related Content

What's hot

Zigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue teamZigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue teamshiva kumar cheruku
 
Super sensitive industrial security system ppt
Super sensitive industrial security system pptSuper sensitive industrial security system ppt
Super sensitive industrial security system pptMohammed Siraj
 
한국무라타전자, 매직스트랩(Magic Strap)의 적용사례
한국무라타전자, 매직스트랩(Magic Strap)의 적용사례한국무라타전자, 매직스트랩(Magic Strap)의 적용사례
한국무라타전자, 매직스트랩(Magic Strap)의 적용사례고양뉴스
 
System Sensor 2WTR-B Data Sheet
System Sensor 2WTR-B Data SheetSystem Sensor 2WTR-B Data Sheet
System Sensor 2WTR-B Data SheetJMAC Supply
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Ambient Intelligence platform with sensors integration, Cristina Rusu, Imego
Ambient Intelligence platform with sensors integration, Cristina Rusu, ImegoAmbient Intelligence platform with sensors integration, Cristina Rusu, Imego
Ambient Intelligence platform with sensors integration, Cristina Rusu, ImegoThe Research Council of Norway, IKTPLUSS
 
Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...
Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...
Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...en.ofweek.com Industrial B2B Marketplace
 
Infrared Remote Control Switch
Infrared Remote Control SwitchInfrared Remote Control Switch
Infrared Remote Control SwitchVivek Porwal
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET Journal
 
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSMOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSShahrukh Javed
 
Embedded Systems & Robotics Projects
Embedded Systems & Robotics Projects Embedded Systems & Robotics Projects
Embedded Systems & Robotics Projects Technogroovy India
 
A report on Rf controlled car
A report on Rf controlled car A report on Rf controlled car
A report on Rf controlled car itfakash
 
NFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesignNFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesignHamed M. Sanogo
 

What's hot (18)

Zigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue teamZigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue team
 
Super sensitive industrial security system ppt
Super sensitive industrial security system pptSuper sensitive industrial security system ppt
Super sensitive industrial security system ppt
 
Mifare cards
Mifare cardsMifare cards
Mifare cards
 
한국무라타전자, 매직스트랩(Magic Strap)의 적용사례
한국무라타전자, 매직스트랩(Magic Strap)의 적용사례한국무라타전자, 매직스트랩(Magic Strap)의 적용사례
한국무라타전자, 매직스트랩(Magic Strap)의 적용사례
 
System Sensor 2WTR-B Data Sheet
System Sensor 2WTR-B Data SheetSystem Sensor 2WTR-B Data Sheet
System Sensor 2WTR-B Data Sheet
 
RFID PROTOCOL
RFID PROTOCOLRFID PROTOCOL
RFID PROTOCOL
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Ambient Intelligence platform with sensors integration, Cristina Rusu, Imego
Ambient Intelligence platform with sensors integration, Cristina Rusu, ImegoAmbient Intelligence platform with sensors integration, Cristina Rusu, Imego
Ambient Intelligence platform with sensors integration, Cristina Rusu, Imego
 
Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...
Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...
Isweek rps 409 a-is2 ultrasonic sensor certified safe for use in explosive en...
 
UHF RFID Reader
UHF RFID ReaderUHF RFID Reader
UHF RFID Reader
 
Infrared Remote Control Switch
Infrared Remote Control SwitchInfrared Remote Control Switch
Infrared Remote Control Switch
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
Rfid
RfidRfid
Rfid
 
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORSMOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
MOBILE BUG ; ACTIVE CELL PHONE DETECTOR USING CMOS & BIPOLAR TRANSISTORS
 
Embedded Systems & Robotics Projects
Embedded Systems & Robotics Projects Embedded Systems & Robotics Projects
Embedded Systems & Robotics Projects
 
A report on Rf controlled car
A report on Rf controlled car A report on Rf controlled car
A report on Rf controlled car
 
NFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesignNFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesign
 

Viewers also liked

Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...IAEME Publication
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityIAEME Publication
 
Venture capital in karnataka
Venture capital in karnatakaVenture capital in karnataka
Venture capital in karnatakaIAEME Publication
 
Ecg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseasesEcg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseasesIAEME Publication
 
TRI Company Overview 2016
TRI Company Overview 2016TRI Company Overview 2016
TRI Company Overview 2016TRInternational
 
Aprendizaje vivencial
Aprendizaje vivencialAprendizaje vivencial
Aprendizaje vivencialOscar1899
 
Catalogue eng
Catalogue engCatalogue eng
Catalogue engchebdveri
 
201307 Phind corp. 公司簡介
201307 Phind corp. 公司簡介201307 Phind corp. 公司簡介
201307 Phind corp. 公司簡介Chia-Yu Kuo
 
Shah Profile
Shah ProfileShah Profile
Shah ProfileBizCare
 
Mario marinez (paginas web)
Mario marinez (paginas web)Mario marinez (paginas web)
Mario marinez (paginas web)Mario Martinez
 
Reunião Pais
Reunião PaisReunião Pais
Reunião Paisedi
 
Pit Bull
Pit BullPit Bull
Pit Bulledi
 
La nostra experiencia amb lóczy
La nostra experiencia amb lóczyLa nostra experiencia amb lóczy
La nostra experiencia amb lóczymascarpone
 
Nutrametrix overview
Nutrametrix overviewNutrametrix overview
Nutrametrix overviewBarbara Smith
 

Viewers also liked (20)

Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
 
Venture capital in karnataka
Venture capital in karnatakaVenture capital in karnataka
Venture capital in karnataka
 
Ecg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseasesEcg signal processing for detection and classification of cardiac diseases
Ecg signal processing for detection and classification of cardiac diseases
 
TRI Company Overview 2016
TRI Company Overview 2016TRI Company Overview 2016
TRI Company Overview 2016
 
Aprendizaje vivencial
Aprendizaje vivencialAprendizaje vivencial
Aprendizaje vivencial
 
Catalogue eng
Catalogue engCatalogue eng
Catalogue eng
 
Esquizofrenia
EsquizofreniaEsquizofrenia
Esquizofrenia
 
201307 Phind corp. 公司簡介
201307 Phind corp. 公司簡介201307 Phind corp. 公司簡介
201307 Phind corp. 公司簡介
 
Shah Profile
Shah ProfileShah Profile
Shah Profile
 
La tierra
La tierraLa tierra
La tierra
 
03 test antonimlawankata
03 test antonimlawankata03 test antonimlawankata
03 test antonimlawankata
 
Mario marinez (paginas web)
Mario marinez (paginas web)Mario marinez (paginas web)
Mario marinez (paginas web)
 
Superiorliving
SuperiorlivingSuperiorliving
Superiorliving
 
Gestalt
GestaltGestalt
Gestalt
 
02 test sinonimpersamaankata
02 test sinonimpersamaankata02 test sinonimpersamaankata
02 test sinonimpersamaankata
 
Reunião Pais
Reunião PaisReunião Pais
Reunião Pais
 
Pit Bull
Pit BullPit Bull
Pit Bull
 
La nostra experiencia amb lóczy
La nostra experiencia amb lóczyLa nostra experiencia amb lóczy
La nostra experiencia amb lóczy
 
Nutrametrix overview
Nutrametrix overviewNutrametrix overview
Nutrametrix overview
 

Similar to A random number generator for rfid tags

RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMijiert bestjournal
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of VehiclesIRJET Journal
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security SystemNataraj Patil
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFIDBharath Chapala
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READERbharath405
 
rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxRohithTopula
 
Frequency Ranges and Radio Licensing Regulations
Frequency Ranges and Radio LicensingRegulationsFrequency Ranges and Radio LicensingRegulations
Frequency Ranges and Radio Licensing RegulationsAvanish Agarwal
 
NAVIGATION IN MINES USING RFID TECHNOLOGY
NAVIGATION IN MINES USING RFID TECHNOLOGYNAVIGATION IN MINES USING RFID TECHNOLOGY
NAVIGATION IN MINES USING RFID TECHNOLOGYIRJET Journal
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptxNameetDaga1
 

Similar to A random number generator for rfid tags (20)

RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
 
IEEE PAPER
IEEE PAPERIEEE PAPER
IEEE PAPER
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security System
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
RFID Electromagnetic project (rfid)
 RFID Electromagnetic project (rfid) RFID Electromagnetic project (rfid)
RFID Electromagnetic project (rfid)
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
Hs3513431348
Hs3513431348Hs3513431348
Hs3513431348
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READER
 
rfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptxrfidbasedemployeetracking-140121120946-phpapp02.pptx
rfidbasedemployeetracking-140121120946-phpapp02.pptx
 
rohith.pptx
rohith.pptxrohith.pptx
rohith.pptx
 
C361520
C361520C361520
C361520
 
Frequency Ranges and Radio Licensing Regulations
Frequency Ranges and Radio LicensingRegulationsFrequency Ranges and Radio LicensingRegulations
Frequency Ranges and Radio Licensing Regulations
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
NAVIGATION IN MINES USING RFID TECHNOLOGY
NAVIGATION IN MINES USING RFID TECHNOLOGYNAVIGATION IN MINES USING RFID TECHNOLOGY
NAVIGATION IN MINES USING RFID TECHNOLOGY
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx2_Unit 2_RFID.pptx
2_Unit 2_RFID.pptx
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

A random number generator for rfid tags

  • 1. International JournalElectronics and Communication Engineering & Technology (IJECET), International Journal of of Electronics and Communication Engineering 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME ISSN 0976 – & Technology (IJECET) IJECET ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), pp. 71-87 ©IAEME © IAEME, http://www.iaeme.com/ijecet.html A RANDOM NUMBER GENERATOR FOR RFID TAGS Mala Mitra Department of Electronics and Communication Engineering PES School of Engineering, Hosur Road, Electronic City Bangalore, Email: mala_2001_in@yahoo.com ABSTRACT In this paper, a true random number generator based on a simple circuit is proposed. The circuit consists of an operational amplifier with a positive feedback. It is a Schmitt trigger circuit without any applied input signal. A Schmitt trigger circuit gives a positive saturated output voltage +Vsat or negative saturated output voltage -Vsat depending on the differential input is negative or positive at the instant of power supply switch on. In the presence of any input signal the output state changes at the crossing of either the upper trigger point or the lower trigger point. In absence of any input signal the input shall be governed by resultant thermal noise voltage of the resistors present at the input. It shall be set at one level either +Vsat /bit 1 or -Vsat /bit 0 depending on the polarity of the differential input thermal noise. Instead of constant supply voltages to bias the operational amplifier clock pair may be used. The polarity of the thermal noise voltage of the resistors present at the input at the instant of rising/falling edge of the clock pair decides the polarity of the output pulses. Since polarity of thermal noise voltage is random the output bit-pattern of 1 and 0 is also random. The output bits are in polar RZ format with no dc component. Results show that, the output passes the NIST test directly. No further randomization of the output bits or input voltage control is required. The proposed random number generator is suitable for RFID tag security and privacy algorithms as the random number generator is very robust to noise, thermal and power attacks prevalent in RFID systems. The simple circuit proposed here can be implemented in existing popular embedded systems for RFID tags e.g. MSP430 microcontroller or WISP. 71
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Keywords: Johnson noise, NIST test, Operational amplifier, Schmitt trigger, Security and privacy of RFID systems. INTRODUCTION RFID is a low-cost solution for object identification. Some of the typical applications are supply chain management, access control, library management, smart appliances etc. [1, 2]. As technology advances, RFID is penetrating more and more in our everyday life. For more widespread applications and to make these systems more popular the security and privacy of the system must be enhanced [3, 4]. An RFID tag sends an Electronic Product Code or EPC for the object to which it is tagged. It gives information about the object class and a unique identification number to any interrogator. This may create a privacy problem. For instance, an RFID tag can be impregnated on little Alice. While Alice plays alone in her wonderland her parents can keep track of her using a RFID detector. Even if Alice hides behind a bush the EPC code from the tag can be read by the detector as RFID system does not need any Line of Sight (LOS) operation. But the problem is, the tag on Alice responds to any detector that conforms to the standard. An adversary can use her detector and by reading the object class can find out all the kids with RFID tags in the vicinity. A kidnapper may track little Alice with the identity number available in the EPC code. This may help to concoct a kidnap plan. Further after knowing the EPC code a tag can be cloned with the same code. The cloned tag can be used for misguiding the parents after a kidnap. The transmission from the original impregnated tag on Alice can be prevented by a metal shield. Standard encryption algorithms e.g. RSA, ECC [5, 6] cannot protect against tracking and cloning. After standard encryption a tag shall send the same encrypted EPC for any interrogation by any detector. An adversary can track an object or a person by the encrypted EPC. No knowledge of the secret key is needed. With the encrypted EPC, tags may be cloned. In case of RFID tag, the encryption algorithm should give different cipher-text or encrypted EPC for each enquiry. However, the authentic interrogator should have some secret information or a key to decrypt and get the unique EPC in every interrogation. Without this secret key the adversary shall not be able to track the tag as 72
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME each time her detector receives an apparently random number. Many algorithms have been proposed in recent days to prevent tracking and cloning. Most of the advanced algorithms use random numbers to randomize the cipher-text [7, 8]. Many random number generators (RNGs) have been proposed in the past and in recent times [9 - 28]. Some of them are quite fit to serve a specific application e.g. genetic algorithm [21], cryptography [10], random frequency hopping in a spread spectrum communication system [22]. These technologies cannot be directly implemented for RFID tags as RNG of an RFID tag must have some special features. Some of the special requirements of the RNG for an RFID tag are listed below. I. Robust to Thermal Attacks: RFID tags and so the RNG must work for a varying working environment. Thermal attack where an adversary deliberately changes the tag temperature to get predictable data is quite possible. However, any RNG may fail beyond a certain range of temperature. It is to be noted that attack usually takes place when a human carries the tag. A human being feels uncomfortable when the temperature deviates abruptly by ± 15 0C from the normal. In such situation the tag can be made inoperable with a metal film cover. Within the comfortable temperature range the RNG should deliver unpredictable data. Tokunaga et al. and Bellido et al [11, 23] utilized thermal noise voltage as input to a meta-stable system. It was shown that at meta-stable point deterministic noise is less when the resolution time of the output bit is high and the output bits from the system can be considered as random. This meta-stable point is very sensitive to input bias, which in its turn changes with ambient temperature. A control system brings the system back to a meta-stable point if resolution time is below threshold. With a thermal attack before the control system works initial bits may get predictable. As a measure, bits are dropped when resolution time is low. But measured resolution time is an average for 128 bits. The attack may happen for less number of bits maintaining the average resolution time at a satisfactory level. II. Robust to Power Attacks: The random number generator should be robust against power attacks. Most of the RFID tags are passive or battery-less. Those utilize the detector power. An adversary 73
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME may deliberately transmit less power from the detector. The tag RNG may generate same bit 0 or predictable bits when it is power hungry or supply voltage or current to the circuit is low. This attack has been demonstrated for Philips Mifare tags [29]. In many of the RNGs randomness is decided by the clock jitter or time difference between a clock pair. In a passive RFID tag instead of generation of clock pair the transmitted pulse train from the detector can be utilized. In that case, the time difference or clock jitter information is also available in the detector and the random number produced is known to adversary [15]. III.Lightweight: RNG and the RFID tag containing it must be lightweight. In most of the cases the strategies used for RNGs give pseudo-random numbers. Additional circuits are used to further randomize it. This takes additional chip area and the RNG no longer remains lightweight. One of the strategies for RNG is to utilize thermal noise voltage as it is known as one of the best sources of random noise. Since amplitude of noise voltage is very low efforts were made to amplify it [20, 24]. In the process of amplification, the voltage gets corrupted by deterministic noise generated in the amplifier. Also the finite bandwidth of the amplifier makes the output colored though there is random or white noise at the input. Further randomization is done with additional hardware. This consumes additional Si area. For superconductive RNG in SFQ circuits [10] the circuit is very sensitive to low thermal noise voltage and further magnification is not required. However, maintenance of superconductive temperature is beyond the scope of a portable lightweight device e.g. RFID. IV.No Seed Value: RNGs that require seed values [15, 28, 30] are not suitable for RFIDs. In this automated system manual entry of seed value is not possible. If known parameters e.g. date or time is used to provide the seed value the unpredictability of the output pattern is lost. Most of the recent hardware RNGs do not need any seed value. V.Intermittent Operation: In some RNGs e.g. continuous chaotic oscillator [9, 25], meta-stable system [11] initial few bits depend on the initial condition and are predictable. It quickly transforms 74
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME to a state where generated data is unpredictable. For a continuously functioning generator the first few predictable bits can be discarded. A passive RFID tag goes for a deep sleep in absence of a detector and the available power. Generator should work satisfactorily as soon as it wakes up. VI.Qualify NIST Test Suite: The output should not follow any definite pattern. The adversary should not be able to predict the output by applying her knowledge. NIST test [31] has been accepted as the standard for unpredictability. The output should pass the NIST test. Apart from these essential features there are some desired features for RFID tags. These are listed below: VII.Part of an Embedded System: There is an urgent need of secured RFID system. It is desirable that the RNG can be implemented on an embedded system that is already in use for tags e.g. MSP430 / WISP [32]. In that case, no extra component is needed for the development of tags to provide security or privacy. Si Chip Implementation: If embedded implementation is not feasible a fully tested light-weight IC that can be readily incorporated in the system is desirable. VIII.Pulsating Voltage: It is desirable that the system consumes low power. As mentioned earlier, a passive tag utilizes detector power. Detector transmits power in the form of a pulse train. Rectifier and regulator circuits are required to convert this pulsating voltage to a stable dc supply. A part of this power is consumed in these circuits. It is desirable that an RNG can function with the pulsating voltage instead of stable dc supplies to minimize wastage of power. Table I and II show the suitability of recently proposed RNGs for RFID tags. 75
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Table 1 suitability of proposed random number generators for rfid tags Refere Basic Principle Any particular Robust Lightweight Intermitt NIST Test nce drawback to ent Results Thermal Operatio (T), and n Power (P) Attacks Chaotic oscillator, time Implementation No No difference between clock of off-chip pairs and further oscillator (T) Not randomization inductance along- 17 out of [9] known with tag antenna 17 (P) No inductance without mutual coupling [10] Thermal noise detection Maintenance of No No Not 1 out of 17 in Superconductive superconductive known Single Flux Quantum temperature 4.2 Circuit K [11] Meta-stability based -- No No No 7 out of quality control 17* [12] Chaos based generator -- Yes No No No result [13] Meta-stability based Too many No No No 15 out of output control reference 17 voltages to be converted from pulsating voltage in a passive RFID tag [14] Clock jitter and further -- Not Yes Yes 13 out of chaos known 17 [15] Rising edge time (i) Generation of No Yes Yes Not done difference between two a pair of independent clocks independent clocks in a passive RFID tag. (ii) Further processing is affected by clock period variation. A time attack is possible. [16] Chaos due to Bernoulli Difficult to (T) Yes Yes Yes 9 out of 17 shift and further implement on Si (P) No randomization due to process variation [17] Random jitter in a Nearby ring Not No Yes Not shown 76
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME number of ring oscillators oscillators get known and further randomization phase locked and randomness is less than expected [19] Random fluctuation of Soft breakdown No Yes No Not shown current in a MOS voltage is capacitor after soft extremely breakdown and further sensitive to randomization fabrication process and operating temperature. Any fluctuation in the operating point may lead to no breakdown or hard breakdown. [20] Amplification of thermal Amplifier (T) Not No Yes Not noise voltage of a resistor degrades the known done and further randomization randomness of (P) No the thermal noise voltage This Saturation of thermal Yes Yes Yes 11 out of work noise voltage 17 Table 2 suitability of proposed random number generators for rfid tags (continued) Implemental in embedded processors Implemented Pulsating Reference on Si Power [9] Not fully No No [10] No Partly No [11] No Partly No [12] Yes, PSOC No need Partly [13] No Partly No [14] Yes, Xilinx Vertex II No need Yes [15] Yes, MSP430 No need No [16] No No No [17] Yes, any FPGA. But consumes huge amount No No of hardware [19] No No No [20] No Partly No This Yes, MSP430, PSOC No need Yes work In the next section the proposed circuit of this paper is discussed. 77
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME PROPOSED CIRCUIT The proposed circuit configuration is based on a Schmitt Trigger circuit [33] as shown in Fig. 1. Schmitt trigger is a special configuration of operational amplifier where positive feedback is used. When the input signal applied at negative input exceeds any of the voltage limits namely upper trigger point or the lower trigger point, the output gets saturated to negative or the positive saturation voltage respectively. Question that remains is: what will be the state of the output in absence of input signal i.e. when the input voltage does not exceed any of the trigger points? Suppose the supply voltage of the operational amplifier is switched on. The output will saturate to either the positive or the negative value depending on the polarity of the difference voltage at the inputs at the time of supply switch on. It will remain to this saturated value as the input voltage does not exceed the trigger point. Instead of constant supply we can apply clock and inverted clock at the positive and negative supply terminals of the operational amplifier respectively as shown in Figure 1. The polarity of the output will be decided by the polarity of the differential input voltage at the beginning of each pulse pair. This input voltage can be given as: Vin = Vtp − Vtn …………………………………………………… (1) Where, Vtp and Vtn are the random thermal noise voltage of the resistor or Johnson noise at the non-inverting (marked as + in Figure 1) and inverting node (marked as – in 78
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Figure 1) respectively. Since the polarity of the output is dependent only on the difference of two thermal noise voltages or Johnson noise voltages it is truly random. To satisfy this condition the output voltage Vout should become zero at the end of the off- state of the clock cycle. In the beginning of the on-state of the clock cycle there should not be any residual voltage Vor from the previous on-state of the clock cycle. If there is any Vor then its polarity will decide the polarity of Vin as well as Vout. In this case, the output will be of same signal level a string of all 1s or all 0s. For a fast clock there will be Vor. For a fast decay of the output at the off-state of the clock many circuit enhancement has been thought of. One of them is connection of an nmos / nFET with slightly negative threshold voltage e.g. -0.1 volt in between output and ground. The gate of the nFET should be connected to clk . In the off-state of the clock, gate voltage is 0 and the nFET should conduct. In the on-state, the gate voltage is negative and below threshold of the nFET so the nFET remains off. The simple circuit proposed here fulfils the requirement of an RNG for an RFID tag. These requirements are listed in Table I and discussed in Introduction section. The following gives the properties of the Proposed Circuit (PC) those make it suitable for an RFID tag. I. Robust to Thermal Attacks: Output bit in the PC depends upon the polarity of the input thermal voltage. Since variation in temperature does not change the polarity of the input the RNG is robust to thermal attacks. PC uses only an op-amp and resistors. These components work for a wide temperature range. For example, LM741, the op-amp used here, has an operating temperature range of -55 0C to 125 0C. If implemented on MSP430 microcontroller, during thermal attacks if the temperature goes beyond this range the in-built temperature sensor can be used to switch it off. II. Robust to Power Attacks: PC uses a clock pair instead of constant supplies. If the clock pair amplitude is reduced the circuit will still remain functional. III. Lightweight: PC output gives random bits that pass the NIST test. No further randomization is 79
  • 10. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME necessary. The simple circuit is very lightweight consisting of only one operational amplifier. IV. No Seed Value: PC is a true random number generator and does not need any seed value. V. Intermittent Operation: PC does not need any resolution time to get unpredictable data. Whenever clock pair is applied at the supply terminals of the operational amplifier random bits are produced. VI. Qualify NIST Test Suite: The tests suitable for small volume of data are done. All the tests are passed. From NIST test qualification point of view it can be said that, the RNG is unpredictable for this small volume of data. VII. Part of an Embedded System: Since PC consists of only one operational amplifier it can be implemented easily in MSP430 from Texas Instruments or PSOC from Cypress Semiconductors. VIII. Pulsating Voltage: PC does not need any constant power supply instead it functions with a clock pair as shown in Figure 1. RESULTS To study the behavior of the operational amplifier IC741 with a clock pair applied at the supply terminals simulation is done. The output voltage as given in Fig. 2 is simulated in TINA TI, a tool developed and supported by Texas Instruments. The clocks given as clk and clk are applied at negative and positive supply terminal of the operational amplifier respectively. In this simulator thermal noise voltage could not be applied at input. Instead a faster clock is applied at the inverting node marked as - in Fig. 1. It can be observed that, the output voltage assumes -3 volts (or +3 volts) if input clock is +200 mV (or -200 mV) at the beginning of the on-state of the clocks. The output bit- stream is in polar RZ format with the advantage of no dc component [34]. 80
  • 11. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME The circuit given in Figure 1 has been implemented on a bread-board. 289 bits have been collected. Some of the tests in NIST require 106 bits. Automatic data acquisition set-up is not ready at this moment. So such an amount of data could not be produced. Only those tests with recommended data size less than 289 are carried out. Lempel Ziv test has not been done as it was deleted from the test suite in the latest version 800-22b. The programs necessary for all the tests were written in MATLAB. The programs were tested with standard data that give predictable p-values. The results for the standard data are listed in Table IV. Table III shows the results for measured data. The p- values show that all the tests were passed. So the proposed RNG is definitely unpredictable for 289 data. For higher volume of data it is quite likely that it shall remain unpredictable. 81
  • 12. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Table 3 NIST 800-22b test results for measured data Test Input size Recommended p value* Input Size Frequency Sample size, n=289 n>=100 0.3776 (Monobit) Test Sample size n=122 1.0000 Frequency within a The length of each M>20, M>0.01n, block block, M=96 . N<100, n≥100 0.4821 The no. of blocks, N =3. Total sample size, n= MN= 288. Run Sample size, n=289 n≥100 0.401573 Longest Run Sample size, n=128. n M Set I 0.6889 Block length, M=8 128 8 Set II 6272 128 0.9732 750000 100000 Binary Matrix Rank No. of rows in each 0.162297 matrix, M=2 N>= 38 No. of columns in each matrix, Q=2 No. of matrices, N=n/{MQ}=72 Total sample size, n= 288 Non-Overlapping No. of blocks, N=2, N≤100 All p_values≥ Template Matching No. of data in each 0.148207 block, M=144, Template length, m=6 Serial (m=2) Sample size, n=289 m<log2n - 2 p value 1 = 0.888179, Template size, m=2 p value 2 =0.842701. Serial (m=3) Sample size, n=289 m<log2n - 2 p value 1 = 0.162805, Template size, m=3 p value 2 = 0.084058. Approximate Sample size, n=289 m<log2n - 2 p value= 0.453542 Entropy Template size, m=3 Cusum forward Sample size, n=289 n≥100 p value=1.000 Cusum reverse Sample size, n=289 n≥100 p value=1.000 82
  • 13. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Table 4 NIST 800-22b test results for standard data Test p value for data pattern All 0 All 1 1010-- Frequency 8.2120e-65 8.2120e-65 0.9531 Monobit Frequency 0.0000 0.0000 1.0000 within a block Run No need of run test as No need of run test as 8.15516e-65 monobit freq test fails monobit freq test fails |pai-0.5|=0.500000 >= |pai-0.5|=0.500000 >= tau=0.117647 tau=0.117647 Longest Run Set I: Set I: Set I: 1.5129X10-32 4.85445X10-41 1.5129X10-32 Set II: Set II: Set II: 1.5129X10-32 4.85445X10-41 1.5129X10-32 Binary Matrix 0.0000 3.2371X10-28 3.2371X10-28 Rank Non- p value=0.000 for p value = 0.000 for p value = Overlapping template template 0.000 for Template 000000000 111111111 templates: Matching p value = 0.145254 p value = 0.145254 010101010 for other templates fot other templates 101010101 p value = 0.145254 for other templates Serial (m=2) p value 1 = 0,000, p value p value 1 = 0.000, p value p value 1 = 2 = 0.000 2 = 0.000 0.000, p value 2 = 0.000 Serial (m =3) p value 1 = 0,000, p value p value 1 = 0,000, p value p value 1 = 2 = 0.000 2 = 0.000 0,000, p value 2 = 0.000 Approximate 0.000 0.000 0.000 Entropy Cusum forward -1.000 -1.000 1.000 Cusum reverse -1.000 -1.000 1.000 CONCLUSION A random number generator suitable for RFID tags is proposed. The simple circuit consists of an op-amp in the Schmitt trigger configuration. In-place of stable power supplies to the op-amp terminals, clk and clk are applied. No signal is applied at 83
  • 14. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME the input instead the thermal noise voltage of the resistors at the input is allowed to saturate and give the output as positive or negative saturation voltage. The circuit output is simulated with the help of TINA TI. The circuit with a 741 op-amp is developed on a bread-board. Measured output passes the NIST test. The simple circuit can be implemented on popular embedded processors for RFID tags e.g. MSP430 or WISP. Design effort can be made to achieve a low power high speed op-amp suitable for this purpose. REFERENCES 1. A. Agarwal and M. Mitra (2006), RFID: Promises and Problems, Techonline. Available: http://www.techonline.com, Accessed on 12th Nov., 2009. 2. R. Das (2007), RFID Forecasts, Players & Opportunities 2007-2017, ED Online and IDTechEx.Available http://www.elecdesign.com/Articles/Index.cfm?ArticleID=14840&pg=3 and http://www.idtechex.com/research/articles/rfid_forecasts_players_and_opportunities_ 2007_2017_00000521.asp, Accessed on 12th Nov., 2009. 3. A. Juels (2006), RFID Security and Privacy: A Research Survey, An invited paper, IEEE Journal on Selected Areas in Communications, vol. 24 no. 2, pp. 381-394. 4. S. Garfinkel, A. Juels, and R. Pappu (2005), RFID Privacy: An Overview of Problems and Proposed solutions, IEEE Security and Privacy, vol. 3 no. 3, pp. 34-43. 5. W. Stallings (2003), “Cryptography and Network Security: Principles and Practices”, Pearson Education, India. 6. D. R. Stinson (2002), “Cryptography Theory and Practice”, K. H. Rosen, Ed. CRC, New York,. 7. S. Yeo and J. Kwak (2007), Privacy Enhanced Authentication Protocol for RFID Tag System Security, IJCSNS, International Journal of Computer Science and Network Security, vol. 7 no. 9, pp. 1-6. 8. M. Mitra (2008), Privacy for RFID Systems to Prevent Tracking and Cloning, IJCSNS, International Journal of Computer Science and Network Security, IJCSNS, vol. 8 no.1, pp. 1 – 5. Digital Object Identifier 10.1109/MPOT.2007.913680. 84
  • 15. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME S. Ergun, and S. Ozoguz (2010), Truly Random Number Generators Based on Non- autonomous Continuous-time Chaos, International Journal of Circuit Theory and Applications, vol. 38, pp. 1-24, Wiley InterScience. 10. Y. Yamanashi, N. Yoshikawa (2009), Superconductive Random Number Generator Using Thermal Noises in SFQ Circuits, IEEE Trans. Applied Superconductivity, vol. 19, no. 3, part 1, pp. 630 – 633, Digital Object Identifier 10.1109/TASC.2009.2019294 11. C. Tokunaga, D. Blaauw, and T. Mudge (2008), True Random Number Generator with a Metastability-Based Quality Control, IEEE Journal of Solid-State Circuits, vol. 43, no. 1, pp. 78 – 85. 12. M. Drutarovsky, and P. Galajda (2007), A Robust Chaos-Based True Random Number Generator Embedded in Reconfigurable Switched-Capacitor Hardware, Radioengineering Journal, vol. 16, no. 3, pp. 120 – 127. 13. J. Holleman, B. Otis, S. Bridges, A. Mitros (2007), C. Diorio; Proc. 32nd European Solid-State Circuits Conference, 2006. ESSCIRC 2006, pp. 134 – 137, Digital Object Identifier 10.1109/ESSCIR.2006.307549. 14. S. H. M. Kwok, and E. Y. Lam (2006), FPGA-based High-speed True Random Number Generator for Cryptographic Applications, in Proc. 2006 IEEE Region 10 Conference, TENCON 2006, 2006, pp. 1 – 4, Digital Object Identifier 10.1109/TENCON.2006.344013. 15. L. Westlund (2006), Random Number Generation using the MSP430, Application Report, Texas Instruments. Available: http://focus.ti.com/lit/an/slaa338/slaa338.pdf Accessed on 1st July 2010 16. T. Zhou, Z. Zhou, M. Yu, and Y. Ye (2006), Design of a Low Power High Entropy Chaos-Based Truly Random Number Generator, IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2006, pp.1955 – 1958. 17. D. Schellekens, B. Preneel, and I. Verbauwhede (2006), FPGA Vendor Agnostic True Random Number Generator, IEEE International Conference on Field Programmable Logic and Applications, pp.1 – 6, Digital Object Identifier 10.1109/FPL.2006.311206. 85
  • 16. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME 18. C. Liu and J. McNeill (2004), A Digital-PLL-Based True Random Number Generator, IEEE International Symposium on Circuits and Systems 2004, ISCAS (1), pp. 773 - 776, Vancouver, BC, Canada - Volume 1. 19. S. Yasuda, H. Satake, T. Tanamoto, R. Ohba, K. Uchida, and S. Fujita (2004), Physical Random Number Generator based on MOS Structure after Soft Breakdown, IEEE Journal of Solid-State Circuits, vol. 39 no. 8, pp. 1375 – 1377. Digital Object Identifier 10.1109/JSSC.2004.831480 20. M. Bucci, L. Germani, R. Luzzi, P. Tommasino, A. Trifiletti, and M. Varanonuovo (2003), A High-Speed IC Random-Number Source for SmartCard Microcontrollers, IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, vol. 50 no. 11, pp. 1373-1380. 21. I. M. Bland, G. M. Megson (1996), Systolic Random Number Generation for Genetic Algorithms, Electronics Letters, vol. 32 no. 12, pp. 1069 – 1070. 22. P. J. Pacini, and B. Kosko (1995), Adaptive Fuzzy Frequency Hopper, IEEE Transactions on Communications, vol. 43 no. 6, pp. 2111 – 2117. 23. M. J. Bellido, A. J. Acosta, M. Valencia, A. Barriga; J. L. Huertas (1992), Simple Binary Random Number Generator, Electronics Letters, vol. 28 no. 7, pp. 617 – 618. 24. B. Jun and P. Kocher (1999), A white paper on The INTEL® Random Number Generator. Available http://www.cryptography.com/public/pdf/IntelRNG.pdf Accessed on 19th July 2010. 25. G. M. Bernstein, and M. A. Lieberman (1990), Secure Random Number Generation using Chaotic Circuits, IEEE Transactions on Circuits and Systems, vol. 37 no. 9, pp. 1157 – 1164. 26. A. J.-Khalili, and D. M. Al-Khalili (1990), A Controlled Probability Random Pulse Generator Suitable for VLSI Implementation, IEEE Transactions on Instrumentation and Measurement, vol. 39 no. 1, pp. 168 – 174. 27. J. L. Perry, R. W. Schafer, and L. R. Rabiner (1972), A Digital Hardware Realization of a Random Number Generator, IEEE Transactions on Audio and Electroacoustics, vol. AU-20 no. 4. 28. Z. Gutterman, B. Pinkas, and T. Reinman (2006), Analysis of the Linux Random Number Generator, Proc. 2006 IEEE Symposium on Security and Privacy (S&P’06). 86
  • 17. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME 29. K. Nohl and H. Plotz (2008), 24C3 Mifare crypto1 RFID Completely Broken, Posted by E. Phillips, Wireless hacks. Available http://www.hackaday.com/2008/01/01/24c3-mifarecrypto1-rfid-completely-broken/ 30. D. E. Knuth (1981), The Art of Computer Programming, vol. 2, Semi numerical Algorithms. Addison-Wesley, Reading, MA. 31. A. Rukhin, J Soto, J Nechvatal, M Smid, Elaine Barker, Stefan Leigh, M Levenson, M Vangel, D Banks, A Heckert, J Dray, and S Vo (2001), A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22. Available csrc.nist.gov/RNG/SP800- 22b.pdf. http://csrc.nist.gov/publications/nistpubs/800-22-rev1/SP800-22rev1.pdf. Accessed on 12th Nov. 2009. 32. H. Chae, D. J. Yeager, J. R. Smith, and K. Fu (2007), Maximalist Cryptography and Computation on the WISP UHF RFID Tag,. Conference on RFID Security. 33. D. A. Bell (2007), “IC Operational Amplifiers and Basic Op-Amp Circuits”, in Electronic Devices and Circuits, pp. 493 – 497, Prentice Hall, India,. 34. S. Haykin (1988), Digital Communications, pp. 234 – 242, Wiley India, New Delhi. 87