Font Size: a A A

Passive RFID Tag Anti-collision Algorithm And Security Authentication Protocol Research

Posted on:2015-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:J F XiaoFull Text:PDF
GTID:2298330467988792Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
RFID (Radio Frequency Identification) is a contactless automatic identification technology whichuses Radio Frequency to do the two-way data transmission. RFID is a technology which has highsensitivity, rapid response, intelligent, transparency, et al. It has been widely used in the production linetrack,accesscontrol,automaticcontrol,eveninsomeseniorandconfidentialityindustry,RFIDisusedtobe anti-fake. And passive RFID system due to the small tag volume which it easy to carry and its lowcost,thesemakepassiveRFIDhasahigherpracticability.RFID is a technology which can identify multiple targets at the same time, however, when thenumberoftagislarge,aseachtagsharethesamewirelesschannelwhentheydothedatatransmission,itis bound to lead channel congestion problem, and it also called tag collision. Tag collision can makeRFID no longer has the advantage of fast identification. It also because of the same wireless datatransmissionchannel,makesRFIDhascertainfragility,namelythesecurityisthreatened.This paperdoes asystematic studyon tagcollision algorithm and securityprivacyin passiveRFIDsystem,themainresearchworkinfulltextinclude:1. This paper does a detailed analysis on traditional FSA (Framed Slotted ALOHA) tag collisionalgorithm’s advantages and disadvantages, then proposes a tag slot selector mode which adjust randomnumber which produced byrandomizer, then select a wayof generating uniform, ergodicitydistributionpseudo random number, making each slot can be selected by tag and reducing the number of freetimeslot.Thispaperdoesasimulation,thisalgorithmonlyoccupy3.125%storagecapacityofthepassivetag,andthisimprovedFSAalgorithmhasahigherrecognitionandstrongerstability.2. Usingtheirreversibilityandlightweightcharacteristics ofone-wayHash function, this paperputsforward a new kind of RFID two-way authentication protocol scheme. This protocol realizes two-wayauthentication, write access authentication and has a filtering operation which reduces the number ofsearchandverifyonback-enddatabase.Shortenthesystemcertificationtimeandenhancethesecurityofthesystem.3. Based on chaotic system is sensitive to initial values and parameters, this paper takes the twocharacteristicstobekey,combineofirreversibilityandlightweightofHashfunction,thispaperproposesa RFID two-way authentication data encryption protocol scheme. This scheme makes full use of theRFIDsystem’sownuniqueidentifier,realizestwotimestwo-wayauthenticationandprivacyofdata,wellcoordinatethesafe,efficient,andthecostoftag.Through the analysis of two core problems of passive RFID system: tag collision and securityprivacy, this paper uses simple chaotic system, improving the efficiency of the RFID tag identificationsystem and implementing the RFID system the tag and the reader identity authentication, write access authentication and privacyof data, and do a distribution of passive tag storage space after the process oftheoperation.
Keywords/Search Tags:RFID, Anti-collision, Authenticationprotocol, Hashfunction, Chaosmap
PDF Full Text Request
Related items