Font Size: a A A

Research On RFID Tag Ownership Transfer Mechanism

Posted on:2010-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:J ShaoFull Text:PDF
GTID:2178360278480728Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is a contactless and automatic identification technology with radio communication. With the advantages of high-speed moving object identification, multi-objects identification, and contactless identification, RFID technology has been widely used in many areas, such as industrial automatization, commercial automatization and transportation management, and brought convenience to our daily life. With the development of technology and establishment of standard, RFID technology will be used in more areas.However, while expecting the bright future of RFID technology, we have to clearly recognize the existing security and privacy problems, which have greatly blocked the development of the technology. A lot of schemes are proposed, but most of them don't pay attention to the security and privacy problems of RFID tag ownership transfer in the RFID multi-systems. This thesis focuses on tag ownership transfer issues. The main work and innovations are as the followings:(1)The working principal of RFID system is introduced. The typical applications are analyzed. The existing security and privacy problems are discussed. By analyzing, the mechanisms used in the common RFID secure schemes can be sorted in three types: physical mechanism, cryptographical mechanism, and political mechanism. The existing RFID tag ownership transfer schemes are analyzed especially, and the advantages and disadvantages of every scheme are pointed out.(2)Aiming at the corporate data security threats in supply chains, a RFID tag ownership transfer scheme for supply chains is proposed. The scheme fulfills the specific requirements, such as the visibility and communication robustness, in supply chains. The scheme has high efficiency, and the executing time of the scheme isn't affected by the number of tags, which make the scheme adaptable to the supply chains. The authentication and secrecy of the scheme is proved by Protocol Composition Logic (PCL). The emulation analysis for the ownership transfer protocol of the scheme is done, and the result shows the scheme's superiority in performance.(3)Aiming at the privacy requirement of consumers, a RFID tag ownership transfer scheme for consumer is proposed. Compared with previous relative schemes, the scheme has two advantages: the process of ownership transfer is complete and the transportation of tag's information is secure. The scheme protects the privacy of consumers. The authentication and secrecy of the scheme is proved by PCL.
Keywords/Search Tags:RFID, ownership transfer, security, privacy, key agreement, Protocol Composition Logic
PDF Full Text Request
Related items