Font Size: a A A

Research On Secure And Serverless RFID Anticounterfeit System

Posted on:2015-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2298330467964654Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification (RFID) technology has been widely applied because of its portability and security features. RFID anti-counterfeiting system consists of tags, readers and the back-end database, using RFID authentication protocol to identify the authenticity of the product tag. This paper analyzes the characteristics and various defects of existing RFID security system, combining with the characteristics of commodity production, presents a secure and server-less RFID mutual authentication protocols and proved the security of the protocol through formal verification methods. The protocol can resist loss of basic privacy, tracking, cloning, eavesdropping, physical attacks and denial of service attacks.We use a server-less mechanism, the reader need not to communicate with backend server during authentication, avoiding increasing the system operating load. This mechanism eliminates the communication cost between RFID reader and backend server, cancels the security risks of data transfer and database and solves the traffic, server computing capacity, scalability of backend servers and mutual authentication between reader and tag.The computation and storage of tags and readers are limited. Authentication protocol based on traditional cryptography methods does not apply to RFID technology. Because of the limited supply of active RFID tag, the time complexity of protocol should not be high. Our protocol will not using complex public key encryption algorithm. We use an authenticated reader to solve the mutual authentication problem. Every reader has its own ID. This ID is unique and allocated by a trusted party. This trusted party will write information of tags to reader. This mutual authentication protocol does not involve complex calculations and required storage capacity is low. It can maintain a balance between efficiency and performance.Compared with existing protocols, our solution takes full account of the limited computation and storage of RFID, security, portability and cost of the system. The protocol can be used to achieve a safe, efficient and portable RFID server-less anti-counterfeit system. It can be used to anti-counterfeit and supply chain tracking for the enterprise...
Keywords/Search Tags:Radio frequency identification, Information Security, server-less, RFIDmutual authentication, anti-counterfeit
PDF Full Text Request
Related items