Font Size: a A A

Research On Security Protocols For RFID System Based On Hash And Symmetric Algorithm

Posted on:2015-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y K LiuFull Text:PDF
GTID:2308330452956963Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As the rapid development of radio frequency identification technology and itscombination with the Internet, mobile communication technology, the used of RFIDsystem is becoming more and more widely. However, due to the inherent characteristics ofthe RFID system, such as lower-cost of tags, the communication channel is open, leadingto a variety of security problems, to protect the data security of RFID system and theprivacy of user is becoming more and more important. In the field of RFID technology, todesign a safety, high efficiency and low-cost RFID security protocol has become animportant factor affecting the application of RFID system.This paper introduces the application of RFID technology and the development statusof RFID security protocols, and then describe the demand for the security of RFID system.Then introduces the RFID security mechanism currently used, especially the typical RFIDsecurity protocols, such as: Hash-Lock protocol, randomized Hash-Lock protocol, Hashchain protocol and makes a detailed description and analysis of the existing RFID securityprotocol. The properties of security protocols, the characteristics and defects are alsoanalyzed.The load of the server of the distributed RFID ask-response authentication protocol isoverweight, aiming at this situations, this paper proposes a modified RFID mutualauthentication protocol, using the reader’s cache to store tag information which has beenverified, and thus the tag has been verified can be filtered to reduce the load of the serverand improve the efficiency of the RFID system.For low-cost tags difficult to balance security issues, to research the existing securitymechanism, this paper proposes a RFID security mechanism based on dynamic ID withfiltering capabilities by readers. This security protocol gives full consideration to thesecurity of the channel between readers and tags, the limits of computational capacity andstorage capacity of electronic tags, the cost of RFID system and other factors. Theprotocol can ensure the security of datas by Hash functions. Compared with the existingprotocols, the protocol in this paper has many significant advantages.On military, financial, telecommunications and other areas of high security requirements, this paper proposes a RFID security protocol based on AES symmetriccryptosystem. The protocol calls for the reader and the tag has a strong operationalcapability, built-in random number generator, and can perform certain symmetricalgorithm encryption and decryption operations.
Keywords/Search Tags:Radio frequency identification, Security protocols, Filtered by reader, Dynamic ID
PDF Full Text Request
Related items