Font Size: a A A

The Research Of RFID Mutual Authentication Protocol For Supply Chain Security

Posted on:2015-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:W P YinFull Text:PDF
GTID:2298330467455763Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Since RFID tags with low cost, small size, large capacity, long life, reusablecharacteristics, current RFID technology has been widely used in many fields ofindustrial automation, business automation, transportation control and managementfields. Supply chain management is one of the main application areas of RFIDtechnology, it is the most significant difference between RFID and other applicationsare: goods with labels is a batch.Although RFID technology is mainly promote the development of the supplychain and development, but the current security mechanism in the field of RFIDtechnology not more in-depth study. Specific security requirements in supply chaindetermines that it can not be directly applied various existing RFID securitymechanisms.This paper defines which communication protocol RFID supply chain must meetthe security needs of six; subsequent analysis and comparison of several RFIDsecurity representative,which focuses on the RFID security protocol based oncryptographic techniques, pointing out its existence safety deficiencies; thenimproved the security needs of Gao et al proposed a random read access controlprotocol, making it more secure; Finally, the improved security protocol analysis andthe BAN logic to prove, and focuses on the protocol.
Keywords/Search Tags:Supply Chain Security, RFID, Mutual Authentication Protocol, BANlogic analysis
PDF Full Text Request
Related items