Font Size: a A A

Application And Research Of Chaos Technology In RFID Security Authentication Protocol

Posted on:2013-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2248330395963142Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) is an untouched auto identification technology and it can automatically target recognition and access to relevant data by using radio frequency signals. As a kind of fast, real-time and accurate high and new technology, RFID has been widely applied to production, retail, logistics, transportation, national defense and other industries through to the only effective identification to entity objects.With the extension and development of Radio Frequency Identification (RFID) technology, its security privacy issues has been gradually got people’s attention as we enjoy the many convenient brought by RFID. If the security privacy problems of RFID systems can’t satisfactorily resloved, the application will have great limitations.First of all, aim at the most important security privacy issues, we analyzed several common authentication protocols, such as Hash-Lock protocol, random Hash-Lock protocol, Hash-Chain protocol based on hash function, then pointed out the deficiencies in these protocols. Based on the characteristics of the pseudo-random, unpredictability of chaotic sequences and extreme sensitivity to the initial conditions, we designed the more effective hash function and used this hash function to improve the authentication protocol.Secondly, in order to prove the security of the protocol, we used formal analysis method——BAN logical to prove the improved protocol and included that the improved protocol met the security and privacy demands. Besides, we would give an example to describe the whole authentication process. From the security, computation and memory capability, we analyzed that the improved protocol was better than others in the integrated aspects.At last, we would implement the protocol with Visual Studio2005to simulate the authentication operation based on the improved protocol. Through supposing the different instances like legal or illegal reader and tag, we could simulate the different outcomes.
Keywords/Search Tags:RFID, Security Protocol, Chaotic Mapping, Hash Function, BAN logical
PDF Full Text Request
Related items