Font Size: a A A

The Design And Realization Of RFID System In Non-air Environment

Posted on:2008-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z F LiuFull Text:PDF
GTID:2178360242465037Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
RFID system works in widespread field. In order to decrease storage cost, it can be used in application including production, sales and management by simplifying supply chain. Replacing traditional bar code, RFID system can also work in digital library, and it can be set up a smart self-construct network et al. It is designed a RFID system that the RFID tag is placed in underground, and this system is based on data-collection in non-fixed point and in air partly. This system model supply reference of RFID technical applied in non-air environment. In order to supply facility of transfer, the system introduces handheld scanner. Simplify the circuit of scanner compared to desktop scanner and design power circuit adapted to battery supply.As the RFID tag works underground, special tag antenna is required whose structure is different from that in air to reach performance equality.The traditional microstrip antenna eliminates dependence of environment, but has some disadvantages. The traditional microstrip antenna with single unbalanced feed was changed into a new one with dual balanced feeds in the model, and using reflection of metal layer with some space from tag antenna, the RFID tag become smaller with 3-D antenna structure.With great benefits such as celerity and facility from RFID technology but also security and privacy issue have arisen. Wireless communication between scanner and RFID tag enforces information exposed in air which brings hidden risk to RFID system. How to improve the performance of RFID system security is pivotal task in RFID field. Many researchers supply authentication protocol in air interface communication to get rid of counterfeit and solve the issue of tracing object using cryptography. So far, it has been proposed many authentication protocol methods about RFID security, such as Hash-chain, random Hash-Lock, distributed RFID Challenge-response etc al. It analysis the hardware and software features about RFID security in ISO 18000-6C standards. The standard supports Kill command and PIN protection, but exists deficiency in application. CRC (cyclic redundancy check) and PRNG (pseudo random number generation) are supplied in standards and can be used in authentication protocol. Identifcaiton authentication and data encryption are very important methods to channel security in mobile wireless communication, and transferring these superior mature tehnology in RFID system supply a way to improve RFID security. Security leaks of some authentication protocols have been pointed out and make them comparation with new scheme, and these security leaks are tranformed in attack models. At last, it is proposed an improved authentication protocol with simpleness and safety in this paper,solve the many security problems in air interface communication and guard against common attacks in wireless communication system, improve the security level of RFID systm.
Keywords/Search Tags:Radio Frequency Identification, Handheld scanner, Tag antenna, Securtiy mechanism, Identity authenticaiton
PDF Full Text Request
Related items