Font Size: a A A

A Privacy-preserving And Lightweight Protocol For RFID Tag Authentication

Posted on:2016-08-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y SuFull Text:PDF
GTID:2308330479992734Subject:Computer technology
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) technology is the rise in 90, an automatic Identification technology in the 20 th century. Has been widely applied in traffic control management, industrial, commercial, and other areas of the tradition,also in zhe military fields. Due to the communication between the reader and tags in unsafe environment, the transfer of data information is completely exposed, security and privacy protected. Security and privacy problem can get a better solution is an important factor of RFID can go further. On the domestic and foreign scientists in the field of information security and cryptography privacy and security of RFID system is a broad and deep research, and design the security agreement of low-cost RFID system become the focus of research work.Based on the relevant basic knowledge on simple instructions as well as the composition of RFID system and basic principle, and then analyzes the existing safety privacy in RFID system. In RFID system, the most important security of privacy on the literature [30] and literature [31] proposed RFID security authentication protocol is analyzed, and points out the deficiencies in the agreement. Aiming at these deficiencies, combined with the safety privacy in RFID system demand, proposed a lightweight, privacy and track RFID security authentication protocol. The improved protocol uses the secure HASH function, to a certain extent to ensure the transmission between the reader and the tag information is safe. Through the analysis can be concluded that the improved protocol satisfies the requirement of security and performance, and through the computation and storage capacity from security, three aspects carries on the analysis comparison, it is concluded that the comprehensive performance of the improved protocol is better than that of literature [30] and literature [31] of the agreement.Finally, this paper uses the Windows MyEclipse6. 0.1 + JDK8.5 enterprise integrated development environment of integration to build simulation system development environment, in the simulation of the agreement for improving mutual authentication between tag and reader- background database, and some actual examples are given.
Keywords/Search Tags:RFID, Hash, Mutual Authentication, Lightweight, Untraceability
PDF Full Text Request
Related items