Font Size: a A A

Research On RFID Information Security Based On Kerberos Protocol And Aes Algorithm

Posted on:2012-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:J H LiFull Text:PDF
GTID:2218330335960586Subject:Logistics Engineering
Abstract/Summary:PDF Full Text Request
RFID is a kind of technology which identifies target automaticly using radio frequency signal and access relevant information, so as to achieve information's non-contact read. With the decline of costs in label manufacturing, it is an conclusion that RFID technology will have an large-scale application in the logistics system, but because the majority of logistics system using RFID technology is an open channel, the business information carried on the label is subject to disclosure if no measures are taken, so the security of information in logistics system using RFID technology is a problem to be solved. In the high security level RFID systems, information must be transmitted in ciphertext, while tags and readers access to each other needs authentication.With the RFID technology's large-scale application in the logistics system, the security of information in logistics system using RFID technology is a problem to be solved. This paper provide an idea of using public key cryptography to improve the Kerberos protocol, and designe to use it in RFID logistics system, it use key allocated by key distribution centers to ensure the security transmission between client and server, achieve mutual authentication between the label and reader, so as to ensure data authenticity. When transmiting private data, this paper choosed AES encryption algorithm to ensure the security in open channel communication. Then use Java code to compare AES algorithm with the MD5, SHA, DES, ECC, RSA and other algorithms, by the way, this paper will analyze the specificity of logistics system based on RFID technology, from the aspect of efficiency, resource requirements, security to prove AES algorithm is the best choose in RFID logistics system.
Keywords/Search Tags:RFID security, Kerberos Protocol, AES encryption algorithm, RFID encryption algorithm
PDF Full Text Request
Related items