Font Size: a A A

Research And Design Of RFID Security Authentication Protocol

Posted on:2011-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:T T YuFull Text:PDF
GTID:2178360305461131Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) is an automatic identification technology following barcode technology and biometric technology. It uses radio frequency that enables wireless data transmission and can identify objects attached with tags at distance without any contacts. RFID has many outstanding strong points, such as no intervention, contactless, and it can achieve the aims for the input and output of information without any optical or visual contacts. RFID can work in a variety of adverse circumstances and identify a mount of tags simultaneously and manipulate conveniently. Nowadays, RFID technology is acknowledged as one of the most important technologies in 21st century, and it can be well used in all kinds of applications, such as production, retail, logistics, and traffic and so on.Nowadays, many technical problems are still unsolved in RFID systems. For example, security and privacy problems, tag collision problems, medial software design, network deployment. This article mainly focuses on the security and privacy issues of RFID systems. With the widely used in various fields, RFID system security and privacy issues have been taken attention increasingly. If the problem can not be solved well, its application would have some Limitations.This article first briefly introduces the background and current status of RFID, describes the constitution and the basic principle of RFID. Then I analyze the security and privacy problems of RFID. Aim at the most important issues, I analyze several common authentication protocols like hash-lock protocol, random hash-lock protocol, hash-chain protocol and "Good Reader" protocol based on hash function, then point out the deficiencies in these protocols. Based on these works and combined with the security requirements, I propose an improved protocol which also based on hash function. This protocol can assure the safety of the information transmitting between the reader and the tag to some extent.Second, by analyzing I can include that the improved protocol meets the security and privacy demands. From the security, computation and memory capability, the improved protocol is better then others in the integrated aspects. To prove the security, I will use BAN logical to prove the improved protocol, then I will give an example to describe the whole authentication process.At last, I will implement the protocol with Visual Studio 2005 to simulate the authentication operation based on the improved protocol. Through supposing the different instances like legal or illegal reader and tag, I can simulate the different outcomes.
Keywords/Search Tags:Radio Frequency Identification(RFID), BAN Logical, Hash Function, Authentication Protocol
PDF Full Text Request
Related items