Font Size: a A A

Research Of RFID Communication Security Protocol

Posted on:2016-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2308330485985222Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification Devices (RFID) is a non-contact automatic identification technology. The data exchange through RF signal transmission in wireless channels. It has been widely applied in industries like retail, logistics and transportation because of the automatic identification,convenient and quick. However, the problems emerged while the Large-scale application, security privacy issues is one of the problems. Due to the openness of the RFID system, the early RFID system does not take into account the security privacy issues in the development process,This problem has become an important factor to impede its further development. Thus, it is vital to design a complete efficient, safe RFID system for information security and users privacy.This article has introduced the research background and current situation of RFID technology by describing the basic system structure and principles of this system. It has analyzed the security and privacy problems it is facing, and deep summarize and analysis on several RFID security authentication protocols with the feature and disadvantage. Combined with the characteristics of RFID system and the need for security privacy issues,it has proposed an improved security authentication protocol based on a dynamic refreshing ID system associated with encryption by AES and Hash algorithms, which has strengthen the security of RFID system to some extent. At the same time, it also solved the problem of data information asymmetry between back-end data and labeled data.Last, it has also analyzed theimplementability, complexity and security of the secure protocol improvement, and proved the safety of the secure protocol improvement by the logical proof from BAN-like logic.Use Visual Studio2010 herein improved security protocol software simulation, further illustrates the protocol of practicality and safety.
Keywords/Search Tags:Radio Frequency Identification, Hash Functions, Advanced Encryption Standard, Formal analysis, Dynamic ID
PDF Full Text Request
Related items