Font Size: a A A

Research On Authentication Mechanism Of UHF RFID Air Interface Protocol

Posted on:2010-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y W WangFull Text:PDF
GTID:2178360302466480Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) technology is a non-contact automatic identification technology realized by means of wireless communication, in advantage of non-contact, high efficiency, anti-interference ability and so on. In recent years, RFID technology has developed very quickly at home and abroad, and has been applied to many fields successfully such as industrial production and daily life, and the range of applications has becoming increasingly widespread. However, the security problems exposed in the application of RFID technology have become more serious, RFID security has become a major constraint impeding the wider use of RFID. At present, the research on security protocol in low frequency or high frequency RFID system has made great progress, and many of good solutions were proposed, but in UHF RFID system, the design of security protocol has a great challenge because of the restrict of tag-cost and other aspects, the number of security protocols in UHF RFID is still few. The research on safe, efficient, low-cost UHF RFID security protocol has become one of the hot areas in RFID technologies.In this paper, the authentication mechanism of UHF RFID EPC C1G2 air interface protocol was analyzed in detail, and several well-known improved authentication protocol were analyzed also, and a new mutual authentication scheme based on dynamic-key was proposed in base of the analysis of the security flaws in the insisting authentication protocols, the security needs and the limited resources of low-cost tags. In the new scheme, an anonymous IDS was sent to the reader in each authentication, so that the illegal track of labels can be effectively prevented, in the other way, a new key construction algorithm was proposed to certain the data security transmission between the reader and the tag in the process of authentication, this algorithm consumes fewer resources and can be achieved in low-cost tag. Mutual authentication between the reader and the tag was achieved in the new authentication scheme, so tracking, counterfeiting and other attacks could be resisted effectively.The results indicate that the new scheme commits with authentication, confidentiality and integrity under the certain security assumption through the SMV model checking formal analysis of the new scheme. The three aspects, time of authentication, channel utilization and time delay of the new protocol were simulated by the OPNET software, and were compared with other existing scheme, the results show that the new authentication scheme proposed in this paper improve the security and still has a better performance, so, the authentication scheme proposed in this paper has a certain practicality in the case of security applications of low-cost tags.
Keywords/Search Tags:UHF, RFID, security protocols, authentication, dynamic-key, SMV model checking, simulation
PDF Full Text Request
Related items