Font Size: a A A

The Research Of Security Protocol In RFID System

Posted on:2014-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ChenFull Text:PDF
GTID:2248330395984241Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Alone with the development of radio frequency identification (RFID) technology, RFIDsystem security and privacy issuses have become increasing prominent. A variety of security issuesappear because of the cost of tag cost and the particularity of wireless channel, the design ofsecurity protocol becomes one of the key technologies in all security measures,the safety,the tagtracking probablity and the efficiency of database search tags become the main research content ofin this paper.According to the storage form of label in the database, security protocols are mainly dividedinto the based on key tree storage and linear storage.In this paper,The average search times ofdatabase and tracking probability of tag is studied about the two kinds of protocols. On this basis,the form of tag-grouped storage in the database is proposed and compares their charactersticthrough the MATLAB simulation chart, Analysis showed that tag-grouped solved the problem ofthe average number of search and tag tracking probability cannot be together.In this paper, analyzing the safety performance and improving the securitymulti-vulnerabilities exist in the LMAP protocol, an improved RFID mutual authentication protocolis proposed-IMAP protocol. Safety performance analysis show that IMAP protocol solves theprivacy problem of the LMAP protocol through the synchronous updating of the information andhash function of encryption, meeting the basic satety requirements and overcoming variousattacks,for example tracking de-synchronization and replay attack. The security of the RFID systemis strengthened.According to the analysis of tag-grouped storage and safety performance in IMAP protocol,the Mutual-authentication RFID Protocol based Tag-grouped security protocol (MAPTG protocol)is put forward. Analysis showed that the advantage of MAPTG is small storage in tag, strongcommunication capability and high safety performance through comparing with otherprotocols.Finally, Using BAN logic further verify MAPTG protocol meeting mutual authenticationand basic safety requirements.
Keywords/Search Tags:Security and privacy, average search times, tracking probability of tag, Labelgroup, hash function
PDF Full Text Request
Related items