Font Size: a A A

Research On The Low-cost RFID Systems Security Protocol

Posted on:2013-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:K TianFull Text:PDF
GTID:2218330371457646Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) technology, raised in the 1990s and gradually moving maturely, is known as a contactless automatic identification technology. By coupling of RF signal, RFID system can identify objects without contact. The RFID technology has a wide application on tracking and positioning. With the development and wide application of RFID technology, the design and improvement of the security authentication protocol becomes increasingly important for the protection of the security and the privacy.Firstly, this paper describes the various components and working principles of RFID systems. What's more, the paper introduces the security and privacy of RFID technology at home and abroad. And finally, the paper analyzes the status of the development of RFID security protocol. According to the classic RFID security authentication protocol, the ability of resistance of the attacks and the efficiency of verification to the system is analyzed. All in all, a complete RFID security protocol should not only have the ability of certification, secrecy and integrity, but also have the ability of resisting various attacks.Based on the analysis of security protocols, especially the weak capabilities of anti-tracking and low efficiency of verifying the label, the random the index security the protocol, short for RISP, is proposed. Through the storage of three root indexes in the tags, the random number and the root index are used to select the appropriate sub-indexes, so as to ensure the label's low cost and also greatly increase the number of available indexes in the label. In the last, the RFID system improves the ability of anti-collision and the efficiency of identification on the condition of low cost.RISP protocol keeps the pre-messages and pre-indexes in the database before the tag is updated, in order to prevent de-synchronization attacks. Through the SOV which is a formal method to prove the protocol and the analysis of the security and the privacy of RISP protocol, it proves that the protocol has a high security and can effectively resist all kinds of attacks.
Keywords/Search Tags:Security authentication protocols, random index, verify efficiency, hash function, radio frequency identification
PDF Full Text Request
Related items