BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Blocking Reader uses inventory round of the protocol to its advantage. The<br />
Blocking Reader transmits a serious of Query commands hence capturing the Tags.<br />
The Tags reply to the query with an RN16 value but instead of acknowledging the Tag,<br />
the BR transmit another Query command. Now the Tag assumes that the Reader<br />
has not received the RN16. So it sends the RN16 again. This is done continuously<br />
capturing the Tag. Blocking Reader uses a low-cost Reader architecture design. In<br />
this thesis I present a different low-cost Reader architectures and implement BR in<br />
the simplest low-cost Reader design.<br />
1.4 Previous Work<br />
Many have come up with different ways to provide privacy and security to the<br />
RFID systems. Jules came up with a concept of Blocker Tag [24]. S.A. Weis proposes<br />
several security mechanisms to make the Tags smarter [44].<br />
1.4.1 Blocker Tag<br />
Ari Juels proposes a simple blocker-tag scheme for privacy protection [24]. Here<br />
blocker tags selectively exploit the tree-walking singulation protocol. Indeed his ap-<br />
proach was to participate in the Tag communication in a non-compliant way causing<br />
active jamming. Here the the approach is behaving like a Tag and sending a full<br />
spectrum of serial numbers. Hence this process will obscure the serial numbers of<br />
other Tags. This makes Readers hard to singulate Tags in the field. The blocker tag<br />
when carried by a person induces a physical region of privacy protection around the<br />
person.<br />
5