首页 | 本学科首页   官方微博 | 高级检索  
     


Emulation-based fault analysis on RFID tags for robustness and security evaluation
Affiliation:1. Centre de Développement des Technologies Avancées (CDTA), Algiers, Algeria;2. Department of Electronics, University of Setif, Setif, Algeria;1. M/A-COM Technology Solutions, Lowell, MA, USA;2. University of Parma, Parma, Italy;1. ARIES Research Center, Universidad Antonio de Nebrija, C. Pirineos 55, Madrid, Spain;2. CNIT- National Inter-University Consortium for Telecommunications, University of Rome “Tor Vergata” Via del Politecnico 1, 00133, Rome, Italy;1. Graduate School of NID Fusion Technology, Seoul National University of Science and Technology, Republic of Korea;2. Dept. of Mechanical and Automotive Engineering, Seoul National University of Science and Technology, Seoul, 139-743, Republic of Korea;1. State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Changping District, Beijing 102206, China;2. State Grid Global Energy Interconnection Research Institute, Changping District, Beijing 102211, China
Abstract:This paper presents an FPGA (field-programmable gate array) based fault emulation system for analysis of fault impact on security and robustness of RFID (radio frequency identification) tags. This emulation system that deals with any RFID protocol consists of two tag-reader pairs, a fault injection module and an emulation controller all implemented in a single FPGA. The designed approach performs single event upset (SEU) and single event transient (SET) fault injection and permits with high flexibility to set communication scenarios and related parameters. Moreover, we propose a classification of produced errors to evaluate fault impacts and identify most sensitive tag flip-flops causing large number of failures and security concerns. The proposed fault injection approach provides suitable means to increase tags' security and robustness. In our experimentation campaign, an ultra-high frequency (UHF) tag architecture has been exposed to intensive SEU and SET fault injections. The duration of the campaign including results analysis is 30 min in where 6,215,316 faults are experimented. Our results have shown that the tag has tolerated 61.82% of SEUs and 67.83% of SETs. The flip-flops that constitute the tag FSM (finite state machine) have been identified as the most sensitive parts causing large number of failures.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号