Font Size: a A A

Research Of Anti-collision Algorithm And Security Protocol In RFID Systems

Posted on:2016-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:J LvFull Text:PDF
GTID:2308330464462580Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) is a non contact automatic identification technology by radio frequency signals. RFID technology has many advantages like fast recognition speed, good security, anti pollution, strong penetrating power, multi object recognition etc. At present, it has been widely used in highway toll, supply chain management, anti-counterfeit for certificates, identity recognition and other fields. Though the application of RFID technology should bring many benefits, some immediate problems are expected to be solved. For example, the data collision problems from the communication of reader and multiple electronic tags. Also, security authentication issues in the process of the wireless communication.In this paper, the two problems are analyzed and explored in detail, and on the basis of the analysis and exploration, the research achievements of anti-collision algorithms and security authentication protocols are introduced, classified, compared, summarized, meanwhile, put forward the improvement and the innovation, summarized as follows:1、An anti-collision algorithm for RFID system based on the tag grouping was proposed by analyzing Frame Slotted ALOHA algorithm in this paper. The algorithm consists of two processes: tag grouping and recognition, it means that the tags of this algorithm are divided into several groups through the Cyclic Redundancy Check code(CRC code) which tags carry, after the completion of the group, the chaotic system could generate uniform distribution of pseudorandom numbers which are selected by each of the tags as time slot number occupied, and then start to identify tags. After reading a set of tag clouds, the other groups will be identified based on the packet numbers. Theoretical analysis and simulation results indicate that the improved algorithm has obvious improvement in recognition speed, regardless of the number of the tags is larger or smaller.2、This paper firstly summarizes several common RFID security authentication protocols, aiming at poor security and high cost of tags, a new lightweight RFID mutual authentication protocol which the security keys updated dynamically is presented by using Cyclic Redundancy Check code(CRC code) operations and some simple logic operations. GNY logic proof and security analysis shows that the protocol can achieve the intended goals, in addition, it not only achieve the mutual authentication requirements effectively between the readers and the tags,but also prevent many security privacy problems such as eavesdropping attack, replay attack, replication attack, the problem of tag tracking on the basis of without increasing computation and communication traffic of the RFID system. Compared with the same safety degree of other existing protocols, the new protocol has lower hardware implementation complexity, and it can realize the combination of high security and low tag cost.This article conducts a comprehensive study about two key technologies in RFID—multi-tag collision technology and security privacy authentication technology, to a certain extent, it solves the problems of multi-tag collision and security privacy, and broads thinking and provides a meaningful reference for solving the practical problems in the future.
Keywords/Search Tags:Radio Frequency Identification(RFID), Anti-collision algorithm, Cyclic Redundancy Check code(CRC code), Security authentication protocol, GNY logic
PDF Full Text Request
Related items