Font Size: a A A

Research On The Authentication Protocol And Cryptographic Algorithm In RFID System

Posted on:2010-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:X F LiFull Text:PDF
GTID:2178360275454934Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Radio-Frequency Identification,abbreviated "RFID",basically provides a means to identify objects having RFID tags attached.RFID has the advantage that long distance identification,high speed of identification and identification of multiple objects and moving targets is possible.Also, it has the ability of penetrating and diffracting objects.There is great applicable potential in access control,anti-fake products,animal tracking, physical distribution and asset management,purchasing goods and distribution,medical applications and other related fields.However,RFID system is facing all kinds of security threats such as forgery,eavesdropping,replay attacks,tampering with information in labels as well as power-consuming analysis attacks.The ability of tracking targets is more likely to cause serious privacy problems.These two issues have become a key factor to restrict RFID technology's comprehensive market.This paper focuses on the two types of security threats in the RFID system:(1) the data security threats in RFID tags;(2) security threats on the communication link between RFID tags and readers.Security and privacy concerns as well as the need for security services to enable the development of novel applications using low cost RFID tags have been illustrated in this paper in the first place.Then,the advantages and disadvantages of the existing solutions have also been analyzed.In view of that two kinds of security problems mentioned above,positive progress has been achieved in this paper in three respects below:(1) General security solution will be put forward to guarantee data security in RFID system and the privacy characteristic of communication tunnel between tags and readers.(2) A mutual authentication mechanism has been designed,which can solve the problems such as privacy or wiretapping,replay attack,forward security,synchronization,indistinguishability or location track and ownership transfer.Only a symmetric encryption in RFID authentication protocol has been utilized and analysis shows that this approach is of good security and privacy,low cost,and high efficiency.(3) A lightweight cryptography will be put forward to provide security and privacy performance,which is from the improvement of the new stream cipher Grain-80.
Keywords/Search Tags:Radio Frequency Identification (RFID), privacy, security, stream cipher, authentication protocol
PDF Full Text Request
Related items