Font Size: a A A

Security And Privacy Protection Of Mobile RFID Conforming To EPCC1GEN2

Posted on:2013-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:L TangFull Text:PDF
GTID:2218330371956060Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Nowadays, RFID technology has become one of the most popular technologies. Nevertheless, most of the RFID industry is only in the closed-loop chain applications. With the continuous expansion of smart card applications and growing popularity of Internet access by mobile networks as well as the development of mobile commerce, RFID is beginning to open its application-mobile RFID applications. However, Mobile RFID systems are facing more and more issues on security and privacy because of its characteristics.The mobile RFID system is facing security threats, such as traditional eavesdropping, forgery, and replay attacks, denial of service attacks, and its target tracking function may most possibly lead to leak of the users' privacy. Moreover, in the mobile RFID system, the reader is embedded in the the mobile device, and for the current popularity of mobile devices, any user can use mobile devices to scan labels and get relevant information. So the reader is no longer trusted as the same as traditional readers. Most importantly, the channel between readers and back-ground server is not considered to be safe as conventional RFID system. If the user wants to use their mobile devices to obtain information from the label, he must firstly be certified by the back-ground serve.In recent years, research on mobile RFID has got some achievements, but there is still no corresponding technical standard. Meanwhile EPCglobal standard has been widely used in the world because of its advantages. So research on mobile RFID combining with EPCglobal standard is of great practical use.This paper studies the EPC Network architecture, and points out its lack of support for individual applications; contrasts the similarities and differences of the EPC Network and mobile RFID network, points out that mobile RFID technology can use and is compatible with the EPC Network. On this basis a generic, scalable, compatible mobile RFID network architecture is proposed, and the function and role of network components is introduced in detail.Then after analysing and improving the exsisted security protocol algorithms in accordance with EPCClGen2 standard between tags and readers, this paper proposes a new EPCC1Gen2 standard algorithm and gives a detailed analysis of the ideological structure of the algorithm and its security and computational complexity. The new algorithm is mainly improved from the aspects of the generation of random number and mechanism for key updating. The new protocal is improved greatly in both security and reducing the computational complexity than the original protocal.For the physical mechanism for privacy protection of the mobile RFID system, this paper analyses some of the existing methods of physical protection and then presents a new method for mobile RFID tag security protection. Firstly, a simple mobile RFID system is designed with existed equipment to successfully identify the card. Secondly the card is controlled by coding under the Microsoft Embedded Visual C++4.0 development environment. The experiments show that the method can control the information exchange between labels and the background server so as to protect the label.
Keywords/Search Tags:mobile RFID, EPCglobal standard, security, authentication protocol
PDF Full Text Request
Related items