Font Size: a A A

Design And Implementation Of Secure Active Rfid Tag System

Posted on:2016-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:C S HuoFull Text:PDF
GTID:2308330473955291Subject:Computer technology
Abstract/Summary:PDF Full Text Request
As a wireless identification technology, RFID technology has been widely applied to many fields after years of development, especially represented by IC card entrance guard of the relevant industry standards of passive RFID system has been very mature. But avtive RFID industry is still in the early stages of the standards, also faces problems like standard not unified, high power consumption, poor compatibility, security threads, and many other problems. These problems become the restricted active electronic tags further promotion of the key factors. In terms of active RFIDstandards in China starts late, it was not until 2012 that established the first standards---2.45 GHz RFID air interface protocol, from the standard set to a wide range of application and industrialization, there is still a long way.Combined with the present situation of our active RFID system and the specific requirements of the project, this paper designed a set of compatible nations mark 2.45 GHz active RFID tags subsystem, and the security problems were studied, based on the design of the hardware system, implements a set of complete label software subsystem, and put forward a set of security protocol can resist common attack, shows good performance in practical application. This article research and system implementation of agreement as of the early military specifications issued by agreement is a new attempt, to promote the improvement of the new standard has a positive role.The main content this paper studies is:1) RFID system are analyzed in detail the current security threats, and the brief introduction of the current security strategies.2) We designed and implemented a set of based on the 2012 version of the radio frequency identification RFID tags of air interface protocol subsystem, including hardware design and software design.3) The File system, prevent collision algorithm for label subsystem done in-depth research and system implementation.4) Designed and implemented a set of compatible with the system security encryption authentication scheme and analyzed the security analysis and implementation scheme.
Keywords/Search Tags:Radio frequency identification, The RFID security, Active electronic tags
PDF Full Text Request
Related items