Font Size: a A A

Rfid-based Security Key Technology

Posted on:2011-09-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:2208360308966765Subject:Communication and Information Engineering
Abstract/Summary:PDF Full Text Request
Counterfeit has always been a major concern around the world, its existence causes a serious threat to the healthy development of the global economy and constitutes a great danger to the consumers, the businesses and even the countries. RFID (Radio Frequency Identification) has become a very suitable technology for the anti-counterfeiting applications because of its own advantages. Most of the current national anti-counterfeiting technologies based on the unique serial number of the RFID tags can not reach the high level security. In these technologies, RFID tags are regarded as the ones difficult to counterfeit. However, RFID techonology itself is an item identification technology which is not designed for security. The appropriate security mechanisms should be adopted to improve the safety.In this article, the following works are carried out in connection with the RFID based anti-counterfeiting key technologies:(1) A track-and-trace anti-counterfeiting model using RFID is proposed. On the basis of the research of the threats for this model, a threat model based on the chain of trust is built. In order to resist the threats, a scalable security mechanism framework is designed and a misuse case diagram is used to show the effect of the security mechanisms.(2) Design the tag-reader authentication protocol according to the characteristic of the RFID anti-counterfeiting system.Focused on the tag-reader authentication issue in the security mechanism framework, a tag-reader authentication protocol in the RFID based anti-counterfeiting system which meets the cost requirements is proposed. The proposed protocol can not only guarantee the privacy of the RFID tags, but also meet all the security requirements and resist the typical attacks. Finally, the safefy and the performance of the protocol are analyzed in detail.(3) Design the ownership transfer protocol according to the characteristic of the RFID anti-counterfeiting system.Focused on the ownership transfer issuer in the track-and-trace anti-counterfeiting system using RFID, a comprehensive analysis on the goal which the ownership transfer protocol needs to achieve is made. After summarizing the relative works, an ownership transfer protocol for the RFID anti-counterfeiting system is proposed. The proposed protocol can not only guarantee the ownership of the RFID tag transfered secretly between different entities, but also safeguard the pravicy of both the old owner and the new owner.(4) Based on the comprehensive analysis of the functional requirements and performance requirements, a track-and-trace anti-counterfeiting system using RFID is designed. The system framework, core components, system flow, deployment, system function and the effectiveness are discussed in detail. The system uses the unique identity, the electronic pedigree and a variety of security mechanisms to provide a high level security.
Keywords/Search Tags:RFID, anti-counterfeit, track-and-trace, authentification protocol, ownership transfer
PDF Full Text Request
Related items