Radio Frequency Identification (RFID) tags and the wireless infrastructure for tag communication has become key technology for providing In-Transit Visibility (ITV) of the Department of Defense (DoD) logistics pipeline and is critical technology for providing effective logistical support to DoD forces in operational theaters. This technology consists of battery powered data rich (128k) RFID tags operating at unlicensed short-range commercial frequencies and a supporting infrastructure of interrogating antennas and handheld readers at hundreds of logistic nodes worldwide. The Assistant Secretary of Defense, Networks and Information Integration (ASD NII) has stated the intent to require encryption between RFID tags and reader/interrogators. In addition, requirements may be imposed for ìdata at restî (data stored on the RFID tags) to be encrypted. In the Small Business Innovation Research (SBIR) Phase I Contract W9QUZ-6-002, Eigent conducted a technology feasibility study and considered alternative strategies for the actual encryption and decryption of data as stored on RFID tags, transmitted at all write stations and at all reading transportation nodes. This research demonstrated that a combination of hardware and software techniques in a ìdefense in depthî architecture can be implemented to secure data both when stored on the RFID tags and when transmitted between the tags and readers. The Eigent Phase II proposal builds on this successful Phase I research. The Phase II goal is to demonstrate the Phase I functionality of this architecture in prototype RFID transponder(s) and reader infrastructure equipment as well as in possible add-on modules to existing industry reader infrastructure equipment, chosen and supplied by the US Army. Both stand alone prototypes and possible add-on modules will be tested in the laboratory, at Eigent facilities and in requested local DoD facilities. Field tests in DoD facilities will assist Eigent in building more easily implemented and integrated Phase III product for the DoD through PM J-AIT.
Keywords: Data Rich Active Radio Frequency Identification (Rfid), Light Weight Security, Authentication, Encryption, Hashing, Defense In Depth, Sensor Network,