Font Size: a A A

Research&Design On Authentication Protocol Of RFID

Posted on:2013-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2248330395956284Subject:Cryptography
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) technology is an automatic identificationtechnology that has been developed since1980s. Compared with other automaticidentification technologies, RFID technology has particular contact less,anti-interference and environmental adaptability characters, so it becomes one of themost excellent automatic identification procedures that are applied in many fields.With the extension and development of radio frequency identification (RFID)technology, the security issue is paid attention to gradually. Since deviser didn’tconsider the RFID security in the fires RFID application, design and the developmentprocess, it is cause the safe problem more and more evidently. It has become theimportant factor which has restricted the RFID application.For resolving existing security problem better in future, at first, this paper hasilluminated several main methods which are used to attack to RFID systems, andanalyze the vulnerability of each component, then introduced an attacker model and asecurity model for RFID systems.In addition, identity authentication is the first barrier for the security of model forRFID systems and it is important to RFID systems. So this paper will analyze severalmain existing RFID authentication protocol from security and computation and presentan improved protocol then illuminate that it is better than other protocols in security andefficiently.At last the security of improved protocol is analyzed by GNY logic.
Keywords/Search Tags:Radio Frequency Identification, Security Model, Authentication Protocol, GNY
PDF Full Text Request
Related items