Font Size: a A A

Research RFID Authentication Protocol Based On Hash

Posted on:2016-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:D WuFull Text:PDF
GTID:2348330488482015Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Radio Frenquency Identification technology(RFID) is an automatic identification technology which can automatically identify the target object by radio frequency signal,which works in open environment. and is the key technology of the Internet of things.It is widely used in logistics transportation, retail, traffic control, security access, animal tracking and recognition, e-commerce and other fields due to its high precision of recognition, strong anti-interference, convenient operation and quick and etc features. While The application design of the RFID system uses the open design, the designers did not take into account security issues originally. and Now, As the popularization of RFID technology in all areas, the safety privacy problem has become an important factor of restricting its application and development. Only solve these problems, the use of RFID technology can have large-scale promote.This paper first briefly analyzes the research background and domestic and foreign current status of RFID technology, and elaborates the composition and working principle of RFID system, and mainly discusses the security problems of RFID. Then, Aim at the most important issues, the paper analyzes the existing security and privacy protection schemes of the RFID system, and points out its shortcomings. On the basis of understanding the security privacy issues and some security privacy protection technology that the RFID system faced,we propose a efficient RFID security authentication protocol based on Hash Function, which can resist the Dos attack. Using the comparison and recognition of random number on the reader, the protocol can resist the Dos attack. And two states of virtual identifier of the electronic tag were stored in the database to realize the database and the tag data synchronization. This paper theoretically analyzes the security and performance of the improved protocol, and compares and analysis the improved protocol with the existing typical authentication protocol, and then proves the security of the protocol by BAN logic. Finally,the authentication process of the proposed protocol is simulated, which shows that the improved protocol availability.It shows that the proposed protocol can effectively complete two-way authentication between the electronic tag and reader, can effectively resist Dos attack, and compared with the existing protocols, the protocol computational cost is reduced, and can be used in the small cost of large-scale RFID system.
Keywords/Search Tags:RFID technology, Two-way authentication, The Hash function, BAN logic
PDF Full Text Request
Related items