Font Size: a A A

Research And Design Of Efficient RFID Secure Protocol

Posted on:2012-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:X L FuFull Text:PDF
GTID:2178330335452256Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification (RFID) is a new radio frequency technology that can automatic identify objects and people. It has the advantage of the large storage capacity of tags, the large identification distance, the unique ID and the characteristics that can simultaneously identify multiple objects without physical contact. The application of RFID is wide. For example, it can be used to simplify supply chain management and track the objects in the entire logistics and transport. And it can be applied to the medical field to real-time monitoring of the patient's physical condition. It also can be used for traffic management to identify vehicle and to prevent forgery of electronic identity and so on. However, there is an unignorable problem in RFID system—no effective security mechanism. Since in practical applications, RFID system is large scale, so whether the security mechanism can be applied in large scale system or not is also an important issue. Now designing an effective security mechanism is the key that RFID technology is widely used or not.This thesis describes existent security problem and privacy problem between the reader and tags in detail, at the same time, analyzes and evaluates the existing security protocols which have been released. Ground on these works, we propose a non-tree structure of the security protocol using encryption and grouping tags, and tags in the same group have the same index. Then the protocol can prevent tracking while reducing the time complexity of the system.This thesis mainly describes the following parts:1. Introduces RFID concept, and makes a detail description for RFID research background, developing course, research situation.2. Analyzes and discusses on RFID system and its composing entities, and expatiates its work principle.3. Analyzes on the security and privacy issues of the RFID system, especially on the security issues between tags and readers in detail. And describes the security requirements of RFID system and large scale RFID system.4. Describes some existing RFID security protocols and some tree-based protocols that used to reduce the time complexity of the RFID system in detail, and separately analyzes their security and performance.5. This thesis proposes a non-tree structure of the security protocol using encryption and grouping tags, and tags in the same group have the same index. The protocol can prevent tracking while reducing the time complexity of the system. And analyzes its security and performance in detail. At last proves the security of the protocol using BAN logic.
Keywords/Search Tags:RFID system, traceability attack, security protocol, time complexity
PDF Full Text Request
Related items