Implementation of Security in RFID Tag Data Transmissions with DES Cryptography

ahmad fali oklilas, ahmad heryanto, anggoro prasetyo


One use of RFID is used as a user authentication tool that can provide more access to a system. Security is much needed on RFID. If authentication rights are misused for the wrong thing then it is very dangerous. The scheme used is to send RFID Tag ID data as a unique authentication code. RFID Tag ID will be sent from client to server using local network scale. RFID Tag ID data transmission can be done using wireless transmission media. When shipping the "bugs" can steal data with sniffing techniques. To minimize the risk of data theft can be applied data encryption method with DES algorithm. There will be a modified 8-bit RFID Tag ID which will add 8-bit user passwords. So 16 bit data can be processed with DES algorithm. With the data encryption at the time of delivery from client to server then data sent will be encrypted. So tappers can not misuse existing data.


RFID; sniffng; DES

Full Text:



A. Kumar, “Automatic critical health care service system using wireless communication, positioning and/or RF ID,” Proc. 2012 3rd Int. Conf. Comput. Commun. Technol. ICCCT 2012, pp. 160–165, 2012.

H. L. Shieh, S. F. Lin, and W. S. Chang, “RFID medicine management system,” Proc. - Int. Conf. Mach. Learn. Cybern., vol. 5, pp. 1890–1894, 2012.

L. Liu, Z. Chen, D. Yan, Y. Lu, and H. Wang, “RFID in Supply Chain Management,” Int. Conf. E-bus. E-Government, pp. 3279–3282, 2010.

P. P. Ray, “A survey on Internet of Things architectures,” J. King Saud Univ. - Comput. Inf. Sci., 2016.

K. Bu, X. Liu, and B. Xiao, “Fast cloned-tag identification protocols for large-scale RFID systems,” IEEE Int. Work. Qual. Serv. IWQoS, 2012.

K. Bu, X. Liu, J. Luo, B. Xiao, S. Member, and G. Wei, “Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems,” vol. 8, no. 3, pp. 429–439, 2013.

Kusnadi, “Pemrograman Socket,” pp. 1–19.

D. Rohila and N. Jain, “RFID Network Administration and Control,” 2014.

D. T. Rajanbabu, “Implementing a reliable cryptography based security tool for communication networks,” pp. 0–3, 2014.

R. Munir, Data Encryption Standard ( DES ). 2004.

H. U. I. Yue-chao and W. Yi-ming, “Secure RFID System Based on Lightweight Block Cipher Algorithm of Optimized S-Box,” no. June, pp. 17–19, 2010.

H. Jo and H. Lee, “A RFID Transmission System with a Security Agent,” vol. 2, pp. 110–114, 2008.

A. LLC, “RFID Quick Start Guide : Arduino,” 2016.

“Arduino Playground - MFRC522,” 2017. [Online]. Available:


  • There are currently no refbacks.