Font Size: a A A

Research Of Anti-collision And Security Protocol Based On RFID System

Posted on:2015-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:W K GanFull Text:PDF
GTID:2268330428497265Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification is a use of radio frequency signals for non-contact automatic identification technology to communicate; it is fast and efficient, reliable and does not require physical contact, and so on, now widely used in animal identification, supply chain management, e-passport system and other merchandise identification and data collection in the field. The tag anti-collision algorithm and security protocol design for RFID is a hot research topic in the field of RFID. Tag anti-collision algorithm is to solve identify problems quickly and efficiently in readable range of multiple labels of RFID systems. Its algorithm is divided into random algorithms and deterministic algorithms, and security protocols are to protect the security and privacy of data users.This article makes a systematic study on anti-collision algorithm and secures authentication protocols. Iinnovation of this article as follows:1. An improved anti-collision algorithm based on binary search is proposed. This algorithm process information of tag collision first, using collision-choose-code seclect the collision-bit, using the counter to the reader and the tag search depth synchronization. Algorithm effectively utilizes label information by calculating the collision collision collision rate and bit digits. Only one of the bits in the collision, when the collision utilization characteristics a non-zero bit immediately identified two pins, and when the number of bits greater than a collision, the collision rate is determined by calculating the number of the search bifurcation. High collision rate algorithm when choosing quadtree search, select a time of low collision rate binary search. Search algorithm using dynamic policy process and return policies, which further reduces the number of queries and traffic data reader. Theoretical analysis and simulation results show that:the improved algorithm with respect to jump better dynamic binary tree algorithm can effectively reduce the number of queries and data traffic, improve system throughput. 2. This article proposed a new security protocol based on dynamic ID with a search-index aiming at the security problem of RFID authentication protocol. The new protocol is effectively reducing the amount of reader’s computation and accelerating query speed by share a search-index. Since the ID is constantly updated by the hash function that the tag ID is dynamic, so the system still holds the tag reader client recently certified ID value, so that the system can respond to the synchronized attacks, but with the security front The new protocol label use by hash function updates the search-index serves as a random number, so that the label side without additional integration of a pseudo-random number generator, reducing the cost of labels. Theoretical analysis and GNY logic derivation shows that:This protocol implements mutual authentication between the reader and the tag, while resistant to replay attacks, spoofing attack, desynchronization attack, forward security, location privacy, anonymity and other eavesdropping attacks and labels a variety of common RFID system attacks, with high safety and practicality.
Keywords/Search Tags:RFID, Anti-collision, Security Authentication Protocol, GNYLogic, Dynamic ID
PDF Full Text Request
Related items