Font Size: a A A

Design Of UHF RFID Tag Compatible With GB/T29768

Posted on:2017-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:X L DaiFull Text:PDF
GTID:2348330485988105Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the launching of China's own intellectual property GB(GB/T29768-2013) protocol, marking China's Internet of Things industry is rapidly developing.Radio Frequency Identification(RFID) as the data collection core technology of IOT, which is now widely used.At the same time, more and more attention has paid to multiple data collection and the security of data communication.GB/T protocol specifies the physical layer ? protocol layer work and air interface parameters of 800/900MHz's air interface.In particular, the standards presents a comprehensive security certification, authentication protocol for RFID system.Generaly, GB/T protocol has great significance for China's RFID industry.First of all, this thesis give a brief introduction to the workflow of RFID systems and the main content of the GB/T29768-2013 protocols, as well as RFID system according to different operating band classification. For GB/T's specific security authentication protocol, the security requirements for RFID system is analyzed, and the importance of data confidentiality, integrity, authenticity, and privacy for RFID users.The main content of the thesis on how to realize an electronic tag in compliance with the GB/T protocol. Firstly, we analyzed the GB/T physical layer protocol's requirements for hardware design, given the corresponding hardware circuit design, including the design of RF front-end circuits, microprocessors and memory circuits, for passive tags' way of working, we analyzes the power supply solutions and block circuits' power consumption of tags. Then give a introduction of how to realize GB/T protocol on software. The physical layer of GB/T protocol mainly specifies the electric signal interaction problem between the reader and the tag; Communication layer mainly specifies the data exchanging patterns between the reader and the tag; The application layer mainly defines the secure communications of upper systems and other related content. Then give the architecture of tag's software, the corresponding protocol stack level division, focuses on how to use the MSP430 processor efficiently achieve the reader decodes the tag data encoding algorithms by interrupt functions and assembly language, on this basis, we introduced the anti-collision algorithm and tag state machine jumps principles. Finally, we give several security algorithms of GB/T protocol and authentication protocol implementation, analyzes the characteristics of each security authentication protocol, highlighting the tag reader mutual authentication protocol. At last, through the functional testing by commercial GB/T reader, confirmed the tag's design is reasonable.
Keywords/Search Tags:RFID, GB/T29768-2013 protocol, tags, Secure identification
PDF Full Text Request
Related items