Font Size: a A A

Research Of RFID Communication Protocol Based On ECC

Posted on:2010-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhangFull Text:PDF
GTID:2178360278975620Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)technology is an untouched auto-identification technology which had been raised in 60's-70's last century. Radio frequency identification systems consist of readers, tags and database. Generally, the readers broadcast an RF signal to access information stored on the tags. According to the actual requirement of the user, the database is able to be adapt to every system, in whicn it store the users'information, and it has powful function of computing and data storage. In the actual, the reader is the device of transmiting and receiving with antenna. The tags are made up from a microchip with some data storage in which it stores information about its unique ID serial number.There is a hidden trouble which can't be ignored in RFID system; it is lack of security mechanism. In general, it is the safe cannel between reader and database; however it is not safe between reader and tage. Because of the wireless communication between reader and tage in the RFID system, there is not safe peer-to-peer cannel, so RFID is not able to protect its date effectively. Currently security of RFID has been an important factor which restricts RFID used on a large scale.In this paper, the existing agreement for data confidentiality, integrity and authenticity of such issues to do an analysis, especially in transmission and expressly ID Rekeying of sync problem, the paper presents a communication protocol based on ECC.The main job of this article is as follows:Firstly, we analyze the existing protocol, the anonymous ID tag of disadvantage, in this protocol, we choice the idea of preparing updating shared key ID, namely: in the database, we store the updated and not updated the two pairs of keys, which would guarantee that authorized key will be authorized in the next poll, which to some extent, solved the problem of data synchronization.Secondly, the ID explicitly transmission issues are reflected in the protocol of the second step of the protocol, the divided ID is two parts, namely: IDx, IDy, and they are separately encrypted and transmitted to the reader, readers will decrypted data blocks and transmit them to the database. In the back-end database, decrypted anonymous ID is compared with stored ID in the database, the tag ID will pass if the conditions meet, which make difficulty increased to protect privacy of users. The data synchronization and ID tag, to a certain extent, is resolved.
Keywords/Search Tags:RFID, Elliptic Curve, Security, Privacy, Protocol
PDF Full Text Request
Related items