Font Size: a A A

The Design Of Security System Based On RFID And Relational Database

Posted on:2018-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChengFull Text:PDF
GTID:2348330512976978Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification technology is an automatic identification technology that replaces the traditional bar code,and acquires the label data used to identify the entity through the radio frequency.It realizes the automatic acquisition of the entity information.It has the advantages of fast identification speed,strong tag data storage capacity,And the ability to adapt to the environment and other characteristics,and gradually in the supply chain,asset management,product traceability and other fields have been more widely used to improve efficiency while reducing the cost.In the application system based on RFID technology,this paper will RFID data model,reader and transponder identity legitimacy between the main research content,according to RFID data characteristics,the data modeled,and read and write Between the device and the label of the certification made in-depth study.Compared with the common data,RFID data has the characteristics of temporal or historical data,implicit semantic,batch and so on to the RFID data storage and management challenges.In order to solve these problems,this paper proposes a data model suitable for storing in the relational database,and implements the data model in the relational database.On the basis of the RFID data,the RFID event Related concepts,and rules-based event handling made relevant introduction.Based on the existing batch authentication,a new batch authentication protocol mechanism is proposed to solve the security and inefficiency of the existing schemes.Under the premise of satisfying the security and privacy,the protocol takes full account of Low-cost electronic label limited computing power,storage space and limited communication range characteristics.In this authentication mechanism,the label is divided into a number of groups,the same group of labels share a GroupKey.In the authentication mechanism proposed in this paper,the relationship between GroupKey and the private key of each electronic label is fully utilized.At the same time,the scheme utilizes the fusion hash function to reduce the communication cost between the reader and the server,and achieves good results.
Keywords/Search Tags:RFID, RFID Data, Spatio-Temporal Model, Authentication protocol, Batch authentication
PDF Full Text Request
Related items