Font Size: a A A

Security Protocol And Application Design Based On RFID Tag Grouping

Posted on:2015-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:K ChangFull Text:PDF
GTID:2298330467974541Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) is a kind of non-contact technology for identifyingobjects, with characteristics of large range data transmit capacity and environmental adaptability.Because of RFID tags can be read without manual intervention, this technology has a brightprospect in the fields of retail, manufacturing, traffic control etc. As a novel technology, RFID isimmature, security and privacy becomes a key problem, which limits the development of RFIDindustry.First of all, this paper introduces the latest development and research of RFID technology, itssystem components and operating principle are described in following sections. Based on pointingout the benefits and disadvantages of existing typical RFID security protocols, this article proposesa security protocol for RFID tag grouping mutual authentication(TGMAP).In TGMAP, RFID reader can select a group of tags at once, and then reads or writes dataautomatically. So as to acknowledge proposed protocol’s safety and performance, attack simulationis performed using C programming language. Simulation result shows that TGMAP can resistreplay attack and desynchronization attack. Moreover, using BAN logic further verify TGMAP canmeet mutual authentication requirements and security requirements.Finally, combined with RFID tag grouping technology and wireless localization method thispaper designs a system to help lost tourist find a way to catch up with his tour guide in scenic spots.
Keywords/Search Tags:Radio Frequency Identification, Security Protocol, Tag Grouping, MutualAuthentication, Scenic Spots Direction Guide
PDF Full Text Request
Related items