Font Size: a A A

The Design And Analysis Of RFID Security Prococol

Posted on:2013-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:L F GuoFull Text:PDF
GTID:2248330371976460Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio Frequency IDentification (RFID) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. It consists of small, low-cost RPID tags containing a microchip and antenna、an RFID reader and back-end server. Tags have the unique ID information. When the reader send the required information to the tag via radio frequency, the reading and writing for tag transfer the data, then send the information to the backend server. Compared with the traditional bar code, IC card, RF tag has some advantages, such as high data transmission rate、long distance in communication、high reliabiy、contactless、and multiple tag reading simultaneously, etc. At present, the RF tag has been applied more broadly whether in industry or in the business. At the same time, it also plays an important role in the Internet of Things. Predictably, in the near future, RF tags will take place of the traditional bar code and effect every aspect of our lives.But the transmission of RFID system is based on wireless communication, and that make the data transmitted easy to eavesdrop. Although RF tags has become increasingly prevalent, related standards do not refer the mechanism which guarantees information security, so this becomes one of the key problems of retarding the RF tags’application. Besides, in the electronic label, computing power and programmable ability is limited. Therefore, designing a kind of appropriate algorithm to provide a secure communication and data interaction is very important.This paper analyses the security of communication between reader and tags and the possible attacks in RFID system. Besides, briefly discusses current security protocols and analyses their security. On the basic of the study, the elliptic curve re-encryption protocol and low cost mutual authentication protocol. are based on the re-encryption technology and low cost tag.This article through to the RFID system reader and labeling of communication security and may be attack analysis, and the existing security agreement of a simple paper and performance comparison. In the study on the basis of the re-encryption technology and respectively based on low cost rf put forward the elliptic curve re-encryption protocol and low cost mutual authentication protocol. The main work of the paper are as follows:(1) The paper introduces the basic concept of RFID and reviews part of the RFID system, the research background and the current situation of the development in this paper.(2) Communication principle of RFID system and the related standard is discussed in this paper. Through the analysis of the standard, we are familiar with its communication validation process.(3) Analyzes the exsiting RFID system safety problems and many kinds of attacks that the tags may meet, especially the privacy issues between tags and the reader authentication. Describe kinds of existing RFID security mechanism, and analyses their safety and performance.(4) Propose the re-encryption algorithm based on elliptic curve. According to this algorithm, Propose a kind of RFID security protocol based on re-encryption security, and analyzes the security of the protocol against various attacks.(5) To satisfy the demand of the cost of tags, which is considered when designed the encryption algorithm, the low cost mutual authentication protocol based on XTEA encryption algorithm is presented, and the paper performs a security and security analysis of the proposed algorithm.
Keywords/Search Tags:RFID, security protocol, ECC, XTEA, re-encryption
PDF Full Text Request
Related items