Font Size: a A A

Research Of Anti-collision And Lightweight Authentication Technology Based On RFID System

Posted on:2017-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:D W LiuFull Text:PDF
GTID:2308330485469652Subject:Computer technology
Abstract/Summary:PDF Full Text Request
RFID, Radio frequency identification, is a technology that can identify the target information without any mechanical or optical contacted between recognition system and specific target, it has the advantages of low cost、small size and high efficiency, RFID systems have been widely used in transportation、animal identification、e-commerce. However, as its non-contact type characteristic, there are some tag collision and the security problems. In order to promote the further application of RFID system, it is more need to be able to design a suitable anti-collision algorithms and security authentication protocol. Anti-collision algorithm is the problem of solving multiple tags simultaneously to identify the collision, and security protocols are to protect the security and privacy of data users.This article makes a systematic study on anti-collision algorithm and secures authentication protocols. The main work includes the following:1. The RFID system, the paper summarized the collision problems and authentication; Contents include the basic composition and working principle of RFID system, RFID tag collision algorithm in the system requirements, the mechanism of the RFID system authentication technology of safety requirements.2. A RFID tag anti-collision algorithm based on adaptive search strategy is proposed. Using forward strategy and backward strategy, and from the impact of the analysis, the value of EPC according to Manchester encoding is divided into "0" and "1" two branches, only the transmission of collision information; at the same time, the concept of collision counter is introduced, and according to the value of the collision counter, it can be directly judged that there is only one of the two tags that have a collision. The use of the two strategies, making the whole process of data reduction in the transmission process, while the identification process of the number of queries is also reduced. Relative to the existing algorithms, the efficiency of the system is improved, and the stability of the system is ensured.3. An improved RFID authentication protocol is proposed, which satisfies the following privacy. In this protocol, the RFID tag is not used to encrypt the traditional HASH functions, but the use of lightweight Rabin based encryption algorithm, thereby reducing the cost of tags; at the same time, all the information is encrypted and then transmitted, which can resist the attack of violence; finally, the RFID system uses LFSR to generate random number, reduce the total number of gate circuits required in the process, and ultimately achieve the goal of reducing the cost of the tag, so as to meet the requirements of the RFID Tags.4. A key generation algorithm of RFID system based on tag’s ID is proposed. In this algorithm, the traditional shared key setting method is discarded, that is, the shared key between the tag and the reader is not required to be set in advance. The label’s ID is divided into two parts, the left side of the text is transmitted, and the value of the right is calculated, the calculated results are in the transmission, which can ensure the security of the transmission information; the shared key is calculated by the number of random numbers generated by the reader and the value of the ID right of the tag.5. A super lightweight RFID bidirectional authentication scheme based on label’s ID is proposed. In this scheme, the RFID tag is no longer a random number, which can reduce the computation cost and the cost of the tag; at the same time, all the operations of the RFID system are based on the computation of less computation, which can realize the ultra-lightweight authentication of RFID system; at the same time, the ID is divided into two parts., the ID is divided into parts of the left and right symmetry, and the bidirectional authentication between the tag and the reader is realized by using the cross bit operation and the cyclic redundancy check method.The innovation of this paper includes:1. A RFID tag anti-collision algorithm based on adaptive search strategy is proposed. In the algorithm, using the forward and backward strategy mechanism, the introduction of the concept of collision counter, reduce the number of the query, reduces the amount of data transmission, improve the efficiency of the identification tags.2. A key generation algorithm of RFID system based on tag’s ID is proposed. In this algorithm, need not set in advance the Shared secret, by the method of dynamic key generation, improves the security of the authentication process, guarantee the safe and reliable of the RFID system.3. An improved RFID authentication protocol is proposed, which satisfies the following privacy. In this agreement, all of the information transmission as the cipher text transmission, make sure the safety of information; adopting Rabin algorithm to encrypt, can better meet the RFID system high strength safety requirements.
Keywords/Search Tags:RFID, Anti-collision, Security Authentication Protocol, Shared Key, BAN Logic
PDF Full Text Request
Related items