Font Size: a A A

Research And Application Of RFID Security Authentication Protocol

Posted on:2013-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:J Q ZhengFull Text:PDF
GTID:2248330362970890Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification (RFID) is a technique using radio frequency to objectidentification and access to relevant data in the open system enviroment. As a new non-contactautomatic identification technology, RFID has been widely applied to the enterprise supply chainmanagement, identification, digital library management, public transportation, anti-terrorism andother fields. RFID is one of the ten important techniques in this century and has become an importantpart of the Internet of things.Wireless transmission, broadcast of signals, resource-constraint, etc. bring some security andprivacy problems. Because of some hackers make the RFID system under increasing threat, the designof RFID security authentication protocol for information security and privacy becomes moreimportant. Nowadays, many RFID security authentication protocols are designed by domestic andforeign scholors. This paper introduces full-fleged protocol, simple protocol, lightweight protocol andultralightweight protocol according to the different security requirements and points out the problemsof each type. Finally we introduce the EPC Class1Gen2standard. It is an important practicalsignificance to design lightweight authentication protocol.In view of the existing security and privacy problems of RFID lightweight authenticationprotocol, A Generalized Inverse Matrix-based security Authentication Protocol (GIMAP) betweentags and back-end server for RFID system is designed, which only uses CRC checksum, some matrixand simple logic operations, implementing the principles of balancing security, privacy and cost. Thisprotocol can prevent many security and privacy problems including reply attack, eavesdropping attack,denial-of-service attack as well as the problem of tracking. Numerical experiment is used to describethe feasibility of the protocol. Once again the GIMAP protocol is summed up from the security andprivacy protection, performance analysis and features. The formal proof of correctness of theproposed authentication protocol is given based on GNY logic which is one of the modal logic.Finally, GIMAP protocol is applied to the RFID anti-counterfeiting system on the circulation ofcommodities. According to practical application of the manufacturer, supply chain and consumer,GIMAP protocol is improved in order to make RFID anti-counterfeiting authentication process safe,reliable and efficient. The application of the GIMAP protocol proposes a solution for low-cost RFIDanti-counterfeiting system.
Keywords/Search Tags:RFID, GIMAP, Security, Generalized Inverse Matrix, Authentication Protocol, GNY logic, Anti-conterfeiting
PDF Full Text Request
Related items