Font Size: a A A

Research Of The Security Authentication Protocol For RFID Systems

Posted on:2013-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:J Q GuoFull Text:PDF
GTID:2218330371957509Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency IDentification) technology is an automatic identification technology by using wireless communication. With the development and application of the various aspects of RFID technology, RFID systems have been widely used in e-commerce, logistics, animal identification and high-way charging. However, with the rise of RFID technology at the same time, a variety of security problems appear. This paper discusses and studies the present RFID of these existing security problems, and compares the existing security mechanisms.At present, the RFID system security mechanisms have the physical mechanism and logical mechanism. Logical mechanism Logic mechanism mainly is safe authentication protocol which is through the sending of both sides protocol information, to complete both sides of the identity authentication .This paper does a lot of detailed study for the existing protocols, and analyses the ability against a variety of illegal attack and the cost of protocols.These protocols have their own advantages and disadvantages, but on the whole, they can not meet the large-scale use of RFID systems. And these protocols think the communication of the Reader and the back-end host system is safe and reliable, because the communication between the Reader and the back-end host system is a wired communication. And there is no protocol to take into account the RFID systems using a wireless reader. So this paper put forward an improved LCAP(Low Cost Authentication Protocol) protocol, which take the advantage of the LCAP protocol and improve the deficiencies of the LCAP protocol.The LCAP protocol of this paper solves the synchronization problem of the original protocol and retain the advantages of simple computation and dynamically updated, despite using the different methods.
Keywords/Search Tags:RFID, radio frequency identification, security authentication protocol
PDF Full Text Request
Related items