Font Size: a A A

Research On Information Security Technology Based On RFID System

Posted on:2014-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:X H QianFull Text:PDF
GTID:2248330395983974Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
As a new identification technology, Radio Frequency Identification(RFID)has tremendousspace in applications,“non-contact” is the greatest advantage of this technology. However, the openelectromagnetic environment not only brings convenience, but also brings high security risk.Privacy has become the problem that must be overcome before many consumers accept RFIDproducts.This paper mainly studies information security issues of the front-end wireless device andprotocol, then analyses the common means of attack that RFID systems are facing. After that, thispaper summaries and introduces some typical physical and logical methods as well as theiradvantages and disadvantages,then models and cracks the contactless smart card for more intuitiveunderstanding of the safety.On the basis, the paper presents a kind of very low cost XOR encryption and authenticationprotocol. In the protocol, several functions interacts to complete fuzzy transimission of data, so as toachieve the purpose of security.It’s very suitable for the applications requiring that security level isnot high and the cost is low. In addition, this paper aslo presents a No-ID authentication protocolbased on symmetric encryption algorithm. By being analyzed, the protocol can resist various formsof attacks. The method that applies the logic relationship instead of ID has certain application value.To address the problem that low-cost tags can not give consideration to security, and based onthe study of the existing security mechanisms, a security protocol for RFID based on compositeencryption and updated secret value is proposed. By analysis and comparison with the existingprotocol, this agreement has been improved significantly in many aspects. In terms of performance,the agreement not only absorbs the benefits of secutity techniques from RFID inquire-responseauthentication protocol based on distributed database environment, but also improves the algorithmcomplexity. Meanwhile, the labels meet the needs of low cost, and achieve the desired results in theinformation protection and practicability. Security analysis and SVO shows that the protocol hasvery good privacy and can resist a series of attacks. Compared with other Hash protocol, thisprotocol has strong advantages.
Keywords/Search Tags:Radio Frequency Identification, security authentication protocols, Hash function, privacy, secret value, hybrid encryption
PDF Full Text Request
Related items