Font Size: a A A

Research And Design Of RFID Security Authentication Protocol

Posted on:2018-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhuFull Text:PDF
GTID:2348330536964015Subject:Mathematics
Abstract/Summary:PDF Full Text Request
RFID technology is a non-contact automatic identification technology, it in the alternating magnetic field and electromagnetic field environment, the use of radio frequency signals for data exchange between the information. RFID technology can penetrate, the application of a long, without the need to help people to achieve data information search, records, etc.. Bar code is considered to be the best alternative.Because the RFID technology has been widespread attention and application in sales,transportation, medical and other industries, has become a commodity supply, the management of enterprises, reduce expenses, can not be ignored to improve the economic development of the market and the means and strength. But RFID there are security and privacy issues, if the problem is not a better solution, then the application will be RFID in various areas is limited. Therefore, it is of great significance and practical value to design a security mechanism to ensure RFID technology.Firstly,this paper introduces the research background and application status of RFID, analyzes and studies the security problems of RFID. At the same time,according to the structure of RFID system,the working principle and standard of RFID system are introduced.Secondly, aiming at the security attacks RFID technology facing the security mechanism of the introduction and analysis of RFID, RFID is a security mechanism based on physical method, the other is based on the security analysis of cryptographic protocols, respectively, hash-lock protocol, hash-lock protocol, hash protocol, random chain, distributed query response protocol and Good Reader "the agreement. In order to solve the security problems in these protocols, a low cost RFID security authentication protocol is designed. The security and performance of these protocols are analyzed and compared. The results show that the improved protocol has good practical value.Finally, the improved protocol is proved by BAN logic. Because an agreement not only needs to be designed, but more importantly, there are analytical methods to prove the logic of this agreement. So, BAN logic is a kind of formal analysis of security protocol, which can prove whether it meets the goal of the protocol.Finally, the improved protocol is simulated with JAVA language.
Keywords/Search Tags:radio frequency identification technology, BAN logic, Hash function, authentication protocol
PDF Full Text Request
Related items