Font Size: a A A

Design Of The RFID Tag Dynamic Management Based On Mutual Hash Authentication

Posted on:2018-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:J C WangFull Text:PDF
GTID:2348330512981429Subject:Information security
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)is a non-contact automatic identification technology,which have been widely used in various fields in recent years,such as in the logistics,transportation,military and other fields.Especially with the rapid development of IOT technology,RFID has become very common and popular in people's daily life.Due to the opening-work environment of the RFID system,it faces security risks such as eavesdropping,counterfeiting,tracking and privacy issues.In view of these security issues,there are two main types of RFID security mechanisms to achieve the security of RFID systems: one is the use of physical methods to prevent or interfere with the communication between illegal tags and reader;the another is the use of cryptographic mechanisms to enhance RFID systems' s security.In the second kind of security mechanism,the security authentication protocol in cryptography has become the most feasible solution.At present,the RFID security authentication protocol based on Hash function has been widely researched and applied,that because of its suitable low cost tag and perfect security mechanism.As a middleweight protocol in RFID,the Hash function based on the RFID security protocol is a compromise solution between the cost and security of the system.So,its security strength cannot reach the heavyweight agreement with the public key cryptography algorithm.Therefore,many research scholars chose the Hash function as the security algorithm for RFID authentication protocol,for improving security and reduce system cost.Based on the research of RFID security authentication protocol and security query protocol,this paper proposes a new protocol to extend the tag query function to extend the protocol application scope.The main contents of this paper are divided into the following three parts:(1)We analyze the existing RFID security authentication protocol and security query protocol.In view of characteristic of these protocols,we have given the design idea of adding tag query function for authentication protocol,and proposed the new Hash function RFID certification query protocol.We analyze the correctness of the new protocol in the theory and formalized the analysis of the protocol,using the BAN logic to prove the security of the protocol.In the existing protocol comparing,we just found that the new protocol can achieve the tag query function,and the system can maintain the better security and efficiency in system's calculation cost,the new protocol also has the application advantages for the existing agreement.(2)This paper analyzes the characteristics of the typical RFID application scenario,the system characteristics and the business process of the warehouse monitoring system.We complete the structural construction and function division of the whole system,and design the system's logic process through the tag query.(3)Finally,we use the computer simulation tool to simulate and test the new protocol from the feasibility of the tag query and the performance of the protocol.Absolutely,the experimental result proves the correctness and effectiveness of the protocol.
Keywords/Search Tags:RFID, Hash, Secure Authentication, Tag Management
PDF Full Text Request
Related items