Font Size: a A A

Research And Design Of Confidential Carriers Management System Based On RFID

Posted on:2013-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:K ShangFull Text:PDF
GTID:2248330374455778Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
At present, most of the enterprises and institutions store the internal confidentialinformation in the mobile storage media, such as the laptop computer, USB flash disk andmobile hard disk. However, how to manage such confidential carriers better and to prevent theconfidential information of the carrier against the leakage, may affect the core interest of theenterprises and institutions. Therefore, management requirements of the confidential carrierswhich store the confidential information will be more and more high.This paper firstly introduces the RFID technology, and analyses the RFID systemstructure, working principle, and advantage relative to other automatic identificationtechnology; Then, aiming at the present situation of the management and the actualrequirements of confidential carriers in the enterprises and institutions, it designs aconfidential carriers management system based on RFID, starting from the overallarchitecture respectively, it discusses the hardware and software system in detail, and realizesthe function demand through the management software.In allusion to the tag collision phenomenon in the application of the RFID system, thispaper firstly analyses the reasons of the collision, and introduces several common solutions;Then, it analyses ALOHA algorithm which is dominant in prevent collision algorithms, andexplains the main characteristics; Finally, it puts forward an enhanced dynamic frame slottedALOHA algorithm for anti-collision in RFID systems, and the algorithm is validated throughthe simulation, whose results show that the proposed algorithm is effectively and accurately.At last, aiming at the security threats which may be faced in RFID system application, thispaper firstly introduces the security threats; Then, it analyses some common RFIDcommunication protocols; Finally, this paper proposes an improved Hash function RFID safeauthentication protocol to solve the security problems between the reader and electronic tags,it is shown that the protocol can effectively resist security threats, such as fake attack,retransmission attack, tracking attack and intercept attack.
Keywords/Search Tags:RFID technology, Confidential carriers, ALOHA algorithm, Cryptographic protocol
PDF Full Text Request
Related items