Font Size: a A A

Research And Design Of Two-Layers/Two-Ways RFID Security Authentication Protocol

Posted on:2014-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y M XiaoFull Text:PDF
GTID:2248330398474717Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Radio Frenquency Identification(RFID) is an automatic identification technology which developed in the1980s following the bar code technology, bio-recognition technology.RFID technology to facilitate automatic identification process and the cheap cost of the label, it has been widely used in all aspects of production, life, military, such as traffic control, retail, production management and control, public safety, port of import and export logisticssupervision, logistics and supply chain management.Initial design and development of RFID systems, did not consider it a security threat, leading to security threats in the RFID system has become increasingly prominent.With the widespread use of RFID technology, these problems cause people more and more attention and become an important factor in restricting the application and development of RFID technology.This paper first introduces the background of RFID technology, development status and trends, describes the basic composition of the working principle and the frequency of the RFID system,analyzes various security threats and constraints that exist in the current RFID system, such as eavesdropping, location tracking, impersonation attacks, asynchronous attacks, Etc. Then, paper researches the existing variety of security mechanisms,mainly researches Kill label, Faraday network enclosures, active jamming, blocking tag,Etc of physical security mechanisms,Hash-Lock protocol, randomized Hash-Lock protocol agreement Hash-Chain, David Digital Library Agreement, the LCAP protocol, Etc of encryption security mechanism,and points out the security issues that can be resolved and shortcomings.Then, summarizes the security requirements of RFID systems and principles of designing RFID protocols,on this basis,designes a double-layer/two-way RFID security authentication protocol.The new protocol uses the double-layer encryption mechanism:when label was first used,using the DES algorithm encrypts label’s identifier in the database side.using the encrypted data insteads of the label’s true identifier;in certification processing,using hash functions encrypts data transmitted between the communication entities (readers and tags).When and only if the tags and readers have been verified as legitimate, begin communication between them.The new protocol effectively solves the security threats that faced by RFID systems, to some extent, ensures the security of data transmission between the communication entities.From the security and efficiency in the implementation of the new protocol were analyzed and compared with the commonly used several security authentication protocol.Order to prove the safety of the new protocol, paper studies the BAN logic system and uses it to formal analysis of the security of the new agreement.After this,give specific data instance,which intuitive and clear description of the certification process of the new protocol.Finally, using the Visual Studio2008development environment coding new protocol,and assumption that the system exists legal and illegal readers, tags,simulate the process of certification of the new protocol,order to explain the availability of a new protocol.
Keywords/Search Tags:RFID System, Security Mechanisms, Authentication Protocal, BAN Logical
PDF Full Text Request
Related items