Font Size: a A A

A Study Of Physical Mechanism From RFID Tag Privacy Protection Of The System

Posted on:2011-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:J T ZhangFull Text:PDF
GTID:2178330332962610Subject:Condensed matter physics
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) Applies very widely, the problem of the privacy form the RFID system has emerged, there still exist in the hidden dangers in the application which can not be ignored: the existence of security vulnerabilities,the lack of security mechanism.analyze the security vulnerabilities on the RFID tag system, the physical mechanism of privacy protection is analyzed in detail, from security requirements and the application value.the common physical security features and shortcomings are analyzed.HMAC-SHA1 encryption algorithm has been proposed, the ideological structure of the algorithm is analyzed, and C language is used, and then analyze its security. the algorithm is based on the HMAC algorithm which embedded in a hash function SHA1, Although HMAC–SHA1 algorithm used hash function SHA1, but the security of the algorithm is no longer dependent on the hash function used by itself,key processes more convenient,and periodi- cally update, it overcome the potential hidden dangers of Hash functions and the key itself, even if the attacker knows the value of the SHA1 hash function, it is impossible to know HM AC-SHA1 function of specific value, and it has a good security.To study the physical mechanism of the privacy protection for RFID system,,we analyze the threat of privacy and the demand of security. It also expounds the relationship between traceability and communication model, RFID security agreement under the basic requirements for the design, the HMAC-SHA1 algorithm is proposed based on the RFID security protocols,it used security protocols to protect the data between the RFID tag and reader.using formal analysis methods, we create an attacker model and the security model,The protocol meet the RFID system security needs, it does not need the certification of central database.In this paper, we analysis the security protocols on the performance and the performance of the HMAC-SHA1 function.the security protocol solve the shortcomings effectively which are easily be attacked ,and this protocol has some features such as low cost, computational load is small and high efficiency. It suits for radio frequency identification system of large and more electronic tags.
Keywords/Search Tags:RFID, security, privacy, security protocol, HMAC-SHA1 Algorithm
PDF Full Text Request
Related items