Font Size: a A A

Study On Key Technigues Of RFID Mutual Authentication And Privacy

Posted on:2013-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:W L ZhangFull Text:PDF
GTID:2298330431459904Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As an important supporting technology of networking industry, RFID (Radio Frequency Identification) technology is one of the most promising techniques. However, as the information can be eavesdropped through the public channel between RFID tags and readers and the limited nature of the computing resources in the label, security and privacy are becoming the bottleneck of the RFID technology which is widespread applied to practical. In order to content with the security requirements of RFID system, we use mathematic and cryptography methods to solve these problems. Considering the security, privacy and effectiveness of RFID protocol, our paper researches the authentication protocol of the RFID system and we show a lightweight RFID mutual authentication protocol. Our paper also studies and analyses the new rapid protocol of RFID which is tag ownership transfer security protocol.First, this paper introduces the structure, working principle, classification and technical standards of RFID system, and analyzes the security and privacy of RFID system. For the security attacks, our paper points out some necessity security attributes of RFID protocol. Then we analyze some typical safety mechanisms, and point out the virtues and defects of these protocols.Second, this paper analyzes several authentication protocols of RFID, and we point out the deficiencies in these protocols. In our view of IHSAP3, this paper proposes an improved protocol which can overcome the defects of IHSAP3. Then, this paper proposes a mutual authentication protocol. Its safety and performance analysis show that our protocol is relatively good in these aspects.Third, the products which embedded RFID tags will deal with the security and privacy issues of ownership transfer in the transaction process. In this situation, a RFID tag ownership transfer scheme which is suitable for both customer and seller. Compared with previous schemes, our scheme has two advantages:the process of ownership transfer is complete and the transportation of tag’s information is secure. The scheme can be good to protect the privacy of consumer.Finally, based on the above work, this paper gives some research directions in the future.
Keywords/Search Tags:RFID, privacy, authentication, mutual authentication, ownership transfer
PDF Full Text Request
Related items