Font Size: a A A

RFID Tag’s Key Seraching Optimization And Model

Posted on:2014-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2268330401466179Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) technology has broad application prospectssuch as electronic payment, supply chain management, environmental monitoring,smart labels, and target detection and tracking, etc. It is also the foundation of theInternet of Things, the important part of wireless sensor networks. With itscharacteristics such as non-contact communication and multi-target long-rangeidentification, RFID is applied to wide range of fields. However, due to itsnon-contact communication characteristic, we also encountered more and moreproblems with the popularity of RFID system. Among them, urgent problems likecommunications security is closely related to the prospects for the application of RFIDtechnology.The paper first introduces the principle and structure of radio frequencyidentification system. In the structure section, I explain the structure and function of thetwo key components: the reader and the tag. In the the RFID principle section, I mainlypresent RFID collision and anti-collision technology. Through the exploration of thesekey basic technology of RFID systems, I further discuss RFID system’s security,privacy and authentication issues.In RFID field, most of the “privacy protection” agreement requires the reader tosearch all labels in the system in order to identify which one it is. In other categories ofagreement, search complexity is reduced to the complexity of total number of tags’logarithmic, but there are two drawbacks: First, it needs long communication payexpenses to overcome the impact from vulnerability of the radio channel. Moreover,destructing a label in the system might leak the secret information of the other labelsthat are not damaged or invaded.I study and research RFID system’s key technologies, the management ofencryption key, and the search algorithm in the paper. Later I analyze and compareRFID system security, and basic nature and strategy of RFID systems’s authenticationand privacy. I also compare and analyze frequently used certified searching agreement.All in all, through the in-depth study of RFID system’s privacy and security authentication technology, I further research on the most important issue facing RFIDauthentication protocol, namely the tab encryption key. This paper takes a differentapproach to solve the problems of the time complexity brought by the privacyidentification in large-scale RFID system. I take advantage of this special RFID systemstructure, propose a symmetric encryption key privacy protection identificationauthentication protocol, the protocol identification time is at the level of constants. InRFID systems, the use of large-capacity memory device is not only decreases theexpenses of communication, but also improves the aging of the tag identification.
Keywords/Search Tags:RFID, authentication protocol, segment lookup, Multiple hash, The labelof privacy
PDF Full Text Request
Related items