Font Size: a A A

Security And Privacy Protection Research Of RFID Application System

Posted on:2012-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:F YangFull Text:PDF
GTID:2178330335969313Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
RFID systems have many types of security and privacy protection solutions, secure authentication protocol which is cost-effective use of the best, so most widely used. Most of these security authentication protocol highlights the two main ways:one is the hash lock scheme, requires random number generator; while the other is the hash chain solutions, without the use of random number generator. Since the hash lock scheme identification process needs random numbers, so it can not predict the future output of RFIID tags; and hash-chain scheme can be predicted. Existing program for this feature hash chain, the main use of sequential search and the LUT search to achieve recognition. In order to achieve server (back-end systems with the general term for many readers) is calculated scalability, Avoine static program order to sequential ways to improve the time required to spend, Avoine dynamic program to improve ways to search the required LUT memory cost. On this basis, this paper has been improved, the improved design of the hash chain solutions, to make the program cost in time and memory at the same time to improve.This paper analyzes the RFID application system security and privacy issues and the causes of the threats, and analyzes the integrity of the RFID application system security policy. On the basis of the existing programs designed to improve the program based on hash chain, the program is for the server but not for tags to achieve improved can significantly improve time and memory cost, and can solve two major attacks on privacy issues, in particular for the attacker to read through the identification of illegal logging to track user behavior in this assault. In the hash chain scheme, the server side need to use pre-computer, this improved calculation scheme of this pre-optimized, also designed a pre-computer value of how we can efficiently update. Finally, the papers makes a reasonable assessment of different sizes obtained in the RFID application system environment, and compares this program and the existing four options (sequential search solutions, LUT search program, Avoine static and dynamic program of the program), in memory use, and the time needed of pre-computer, certification and update.The main work of this paper are:1.The existing security protocols based on hash chain scheme are analyzed for their implementation on the server side the existing problems in detail. 2. Server-side uses different data structures from existing programs use.3. Designing to improve based on hash chain algorithm on the server side of the pre-computer optimized, and implemented more efficient in identifying the pre-computer values to update and improve the efficiency of the server, reduce the cost of its memory.4. In the experiments carried out on the basis of rational analysis and evaluation, improve the effectiveness of the program has been obtained in different scale RFID application system environments.
Keywords/Search Tags:Hash chain, pre-computer, identify, updata
PDF Full Text Request
Related items