Font Size: a A A

Radio Frequency Identification System And Its Data Security

Posted on:2003-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:J P ChuFull Text:PDF
GTID:2208360122466755Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
As a new technology of Auto-ID, RFID can be widely used in all kinds of fields. The most significant feature of RFID is that it can contactlessly communicate to reach the goal of Auto-ID by radio frequency. It has many merits over identification by contact, such as convenience, flexibility, being able to identify moving objects effectively.This kind of RFID system has been widely used in some developed countries. However there is still not mature RFID system including contactless IC cards and read/write devices in our country. Almost all these kinds of device should be imported. So it is very necessary to develop our own technology of cantactless IC cards and driver IC of read/write device. Some research about using means of ASIC to realize read/write device and security ability of data communication is made on the basis of well knowing of the whole RFID systems.These works are presented in this paper:1 , research and introduce the theory of the whole RFID system, including key technologies such as structure of the system, flow of working, interface of energy and data, integrality and security of transmission of data.2, As the key module to the performance of whole system, anti-collision algorithm was compared and analyzed. Then an optimized dynamic ALOHA algorithm is selected and realized using verilog HDL. Test bench to this algorithm is also written to simulate this module. At last this module is synthesized using 6S06DPDM technology library.3 , The algorithm used in key module to the performance of data security is thoroughly analyzed. Considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used. A new non-linear stream cipher algorithm with ability of self synchronization is presented. This algorithm is also realized using verilog HDL and is simulated.4 , A solution of realization of driver IC in read/write device is presented and some test are also performed.5 , At the end of the paper, conclusion and expectation are made.
Keywords/Search Tags:Identification
PDF Full Text Request
Related items