Font Size: a A A

Rfid Security Authentication Protocol Based On Hash Function And Design,

Posted on:2012-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q LiFull Text:PDF
GTID:2208330335480080Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is a non-contact information transmission technology, it is realized by wireless radio frequency signal through alternating magnetic field and alternating electromagnetic field, and it reached the purpose of automatic Identification and data exchange through the message that it transmitted. It is gradually replacing the usage of traditional barcode technology, as it is a non-contact technology and Can realize batch read, identify high-speed moving objects, work in all sorts of bad environment, Simple operation and etc features. But, because of its non-contact features, in people defenseless situation can read information from these characteristics of existing traditional barcodes, making it the safety technology does not exist in privacy issues. As the popularization of RFID technology in all areas, safety privacy problem has become more and more each application domain concern. If these issues are not well solved, it will limit the large-scale promotion of RFID in a certain degree. This paper is researched on the background of RFID system.The first part of the article introduce the current research status and future trends at home and abroad of the RFID, and then the structure, organization and working principle of the RFID system are discussed simply, and then the existing security and privacy protection schemes of the RFID system are analyzed and evaluated, and its shortcomings is pointed out. On the basis of understanding the security privacy issues and some security privacy protection technology that the RFID system faced, this paper gives a security privacy protection scheme that based on two-way authentication of Hash function. By the analysis and comparison, we know that this agreement meet the safety and performance requirements. In order to prove the reasonable and safety of the agreement, this paper use BAN logic to prove the improved protocol logically. Finally the mutual authentication process between readers and labels is simulated in MyEclipse6.0 and JDK1.6 environment according to the improved scheme.
Keywords/Search Tags:Radio Frequency Identification technology, RFID system, Security authentication protocol, Hash function, BAN logic, MyEclipse development environment
PDF Full Text Request
Related items