Font Size: a A A

RFID Authentication Protocol Based On Hash Function

Posted on:2013-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2218330371957646Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is a technology for non-contact automated identification of objects, with characteristics of large data storage capacity and environmental adaptability. RFID tags are readable without line-of-sight contact and without precise positioning. With its own advandtages of RFID technology can be widely used in the fields of traffic control, Electronic Article Surveillance gate, supply chain, disease traceability and waste collection etc. RFID technology may improve efficiency and reducing costs for the business or organization.However, in practical applications, the security and privacy of RFID systems is a key question which may confine the popularization of RFID technology, and RFID security issue has attracted more and more attention to propose efficient ways and means. There are two important factors that impact the function of security technique. On the one hand, RFID Tag has very limited power, storage capacity and computing ability. On the other hand, the communication signals between the Tag and Reader are transmitted by wireless channel, which is exposed to attackers.In this paper, we propose a strong authentication protocol based on Hash function for RFID system—SAP. The proptocol achieves mutual authentication between the Reader and Tag, can provide Tag anonymity, indistinguishability and untraceabilty, also offers forward security. It can resist replay attack and desynchronism attack. The analysis and formalize prove indicate that the protocol has preferably security and efficience. Moreover, the protocol supports Tag agent and ownership transfer, with Tag agent the scalability of RFID system probably improved. We also propose an authentication protocol of RFID system for ownership transfer. The propose protocol can protect security and privacy for the old owner, and resist Tag traceability of the new owner.
Keywords/Search Tags:Radio Frequency Identification (RFID), passive Tag, authentication protocol, security, Hash function
PDF Full Text Request
Related items