Font Size: a A A

Research And Implication Of RFID Security Identification Protocol

Posted on:2015-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z L ZhengFull Text:PDF
GTID:2268330425988942Subject:Information networks and security
Abstract/Summary:PDF Full Text Request
:The earliest application of RFID(Radio Frequency Identification) was in the World War II, which helped to differentiate the enemy aircrafts and friendly aircrafts. With the step of science and technology and economy, the RFID technology obtained great development in recent20years. At present, RFID technology has been widely used in manufacturing, garment industry, logistics, retail industry, medical service, identification recognition, anti-forgery technology, asset management, library application, automotive, aerospace, military and other fields.In the RFID system, Tag and Reader verify the legitimacy of each other by checking the messages from the sender. The wireless communication environment between Tag and Reader makes the attackers have chances to intercept, tamper, forge or resend the original information, which will undermine the normal authentication process. This will encroach on the rights of the holders of the Tag, affect the normal operation of the system and violate the Tag holder’s interests.Some articles about RFID authentication protocol based on Hash function are introduced and analyzed. A RFID authentication protocol universal model is put forward. According to the model, we classify related research articles and put forward corresponding security solutions to each type. It also proposes two RFID identification protocols named RP(Randomly Protocol)and RSP (Randomly Select Protocol),which can prevent these common attacks. The protocols adopts random number generator, XOR function, XNOR function, Hash function and other functions to processing the data between Tag and Reader. They provide a new computing model:the calculator chooses different calculation method according to some bits of a sequence of numbers. They also come up with a new privacy information updating method:after every successful authentication, Tag and The DB update their wrong record but keep the right one the same.It uses C#programming language (the Visual Studio platform) to simulate the authentication process, and this verifies the feasibility of the agreement; it also simulates several common attack methods and uses BAN logic proving that the protocol has reliable security; finally it uses Visual Studio to simulate the RP protocol and the RSP protocol. Results show that the RSP has higher efficiency. At last, we use hardware to implement the RSP protocol. All the research shows that the RSP protocol can basically meet the requirements of low cost, reliable security.
Keywords/Search Tags:RFID, Hash function, Randomly Choose, Visual Studio
PDF Full Text Request
Related items