Font Size: a A A

RFID Systems And The Research Of RFID Authentication Protocols

Posted on:2008-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178360242472347Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) technology is an automatic identification technology that has been developed since 1980s. Compared with other automatic identifyication technologies, RFID technology has particular contactless, anti-interference and environmental adaptability characters, so it becomes one of the most excellent automatic identification procedures that are applied in many fields.With the extension and development of radio frequency identification (RFID) technology, the security issue is paid attention to gradually. Since deviser didn't consider the RFID security in the first RFID application, design and the development process, it is cause the safe problem more and more evidently. It has become the important factor which has restricted the RFID application.For resolving existing security problem better in future, at first, this paper will illuminate several main methods which are used to attack to RFID systems, and analyze the vulnerability of each component, then found an attacker model and a security model for RFID systems.In addition, identity authentication is the first barrier for the securety of RFID systems and it is important to RFID systems. So this paper will analyze sevel main existing RFID authentication protocol from security, memory space and computation and present an improved protocol then illuminate that it is better than other protocols in security and efficienty.Then the security of improved protocol is analyzed by BAN logic.At last, throught simulating improved protocol and distributed RFID challenge-response protocol by Visual C++, we will test and compare their run time without error, and then illuminate the improved protocol is better in efficiency.
Keywords/Search Tags:Radio Frequency Identification, Attacker Model, Security Model, Authentication Protocol
PDF Full Text Request
Related items