Font Size: a A A

Research And Hardware Implementation Of Mutual Authentication Scheme Complatint To EPC Class 1 Generation 2

Posted on:2013-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:S W LengFull Text:PDF
GTID:2218330371956130Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
RFID technology is a non-contact automatic identification technology, mainly consists of reader, tag and antenna. With the development of the technology, RFID applications growing, has been involved in all aspects of daily life, and will become a basis for building the information society technologies. RFID technology has been applied to all walks of life in our daily lives. As more software and hardware vendors to join the investment and development of RFID, RFID has been more rapid development. Various standardization organizations devote in the development of global RFID standards, including ISO standards organizations, EPCGlobal and Japanese UID. However, with the development of RFID capabilities and the growing popularity of tagging, security problem, especially the privacy problem is becoming more and more sever. Many scholars began to study a more simple and effective security authentication protocol to enhance user information security. The paper focus on the research on the authentication scheme complaint to EPC Class 1 Generation2:1) Analysis the standard system framework of EPCGlobal, and more focus on studying EPC Class1 Generation2 standard, including the classification of EPC label, the storage and operation of the EPC label, coding and modulation between reader and tag, to make a preparation for further study on authentication scheme in next chapter.2) Research and analysis of existing EPC Class 1 Generation2 under the standard security authentication protocol:EPC C1 G2 self-made one-way authentication, vulnerable to attacks in the middle and the risks of fake tag and exposure of access password; Authentication scheme proposed by Karthikeyan-Nesterenko et al, vulnerable to DOS attacks and replay attacks and risk of the privacy; Authentication proposed by Due et al, vulnerable to DOS attacks and fake tag; finally introduce the authentication scheme proposed by Konidala et al.3) Fully analysis the authentication proposed by Konidala et al, analysis the security risks and propose a improved the authentication scheme with a fully security analysis, which proved to be more security than Konidala's.4) Base on the improved the authentication scheme proposed by this paper, with the software and hardware simulation, demonstrated that the improved scheme is accuracy and realizable. In software aspect, based on QuartusⅡintegrated environment and take Verilog HDL language to implement the simulation; In hardware aspect, take CycloneⅡEP2C70F896C6 from Altera, designed a hardware platform to implement the simulation.5) To further research the practical value of the authentication scheme proposed by this paper, based on HBE-RFID-REX platform by Handback electronics. With the configuration of the hardware platform, designed a reader software with the authentication algorithm proposed by this paper. With the analysis of the results, further verified the practical value of the improved the scheme.This paper mainly study the authentication scheme complaint to EPC Classsl Generation 2, and proposed an improve one, with hardware implementation ans simulation, proved to accuracy and effective. Finally, apply the improve the scheme into practiacal designed reader-tag system, further verify its practical value, which cam provide a more convincable reference value for future system complaint to EPC Class 1 Generation2.
Keywords/Search Tags:RFID, EPC Class1 Generation2, FPGA, Hardware implementation, Authentication scheme, Security and privacy
PDF Full Text Request
Related items