09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Blocking Reader uses inventory round of the protocol to its advantage. The<br />

Blocking Reader transmits a serious of Query commands hence capturing the Tags.<br />

The Tags reply to the query with an RN16 value but instead of acknowledging the Tag,<br />

the BR transmit another Query command. Now the Tag assumes that the Reader<br />

has not received the RN16. So it sends the RN16 again. This is done continuously<br />

capturing the Tag. Blocking Reader uses a low-cost Reader architecture design. In<br />

this thesis I present a different low-cost Reader architectures and implement BR in<br />

the simplest low-cost Reader design.<br />

1.4 Previous Work<br />

Many have come up with different ways to provide privacy and security to the<br />

RFID systems. Jules came up with a concept of Blocker Tag [24]. S.A. Weis proposes<br />

several security mechanisms to make the Tags smarter [44].<br />

1.4.1 Blocker Tag<br />

Ari Juels proposes a simple blocker-tag scheme for privacy protection [24]. Here<br />

blocker tags selectively exploit the tree-walking singulation protocol. Indeed his ap-<br />

proach was to participate in the Tag communication in a non-compliant way causing<br />

active jamming. Here the the approach is behaving like a Tag and sending a full<br />

spectrum of serial numbers. Hence this process will obscure the serial numbers of<br />

other Tags. This makes Readers hard to singulate Tags in the field. The blocker tag<br />

when carried by a person induces a physical region of privacy protection around the<br />

person.<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!