Font Size: a A A

Research And Implementation Of RFID Security Authentication Protocol

Posted on:2018-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:H Y GuoFull Text:PDF
GTID:2348330518468592Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Frequency(radio frequency identification(Radio)Identification(RFID)is a non-contact automatic identification technology,which uses the inductive coupling and the principle of electromagnetic backscattering physical information to achieve contactless transmission.It can work in a variety of harsh environments without manual operation,so it has better performance advantages compared with other traditional identification technology.With the popularization and development of RFID technology in retail,logistics,production,transportation,security,medical and other fields,the security and privacy protection of RFID system has become the focus of people's attention.In the system of reading and writing and communication between the label is on the wireless channel,the two transmitted data are intercepted and exposed to the outside environment it is easy to suffer from illegal eavesdropping falsified,the privacy was leaked,serious damage to the lawful rights and interests of users.Thus,the RFID system is bound to lack of an effective security mechanism to protect it or its future development will be severely constrained.The research results of this paper are as follows:1 based on the above background,this paper introduces the research background and significance of RFID technology,describes the system composition,basic principles,system classification and system standard of RFID.This paper describes the security threats faced by RFID system and the corresponding protection mechanism,and systematically analyzes the existing RFID security authentication protocols based on cryptography.This paper gives a detailed description of the different types of security authentication protocols,such as SASI,MW privacy protection protocol,OSK protocol,distance limit protocol,SM privacy protection,and points out the defects and shortcomings of these protocols.2 in this paper,the security requirements of RFID system and the design principles of security protocols are summarized,and a RFID based bidirectional authentication protocol based on Hash function is designed.Compared with different security protocols,we can see that the new protocol can not only effectively solve the security and privacy issues of RFID system,but also has good performance and high efficiency.3 in this paper,we use the BAN logic system to make a formal analysis of the security protocol and prove the security of the protocol.4 using Myeclipse 2014 and MySQL 5.5 as the development environment for the simulation of authentication of security protocol is improved,and the simulation of the certification process of different legal and illegal reader and tag the effective description of the availability of the improved protocol.
Keywords/Search Tags:RFID, security authentication protocol, Hash function, BAN logic, Software implementation
PDF Full Text Request
Related items