Font Size: a A A

Research On Anti-counterfeiting Application Technology Based On RFID

Posted on:2018-09-30Degree:MasterType:Thesis
Country:ChinaCandidate:M Y WangFull Text:PDF
GTID:2348330542465504Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification)is a non-contact automatic identification technology,which can be used to identify objects and collect information quickly.It has been used in logistics,transportation,medical and other fields widely.This paper mainly studies the anti-counterfeiting application technology which based on RFID,the main work includes the following aspects:Firstly,the development status of RFID technology at domestic and abroad is researched.The composition of the RFID system,the principle of implementation and related standards are introduced briefly.The physical methods and cryptography used in anti-counterfeiting technology are analyzed especially.At the same time,the encryption algorithm,signature algorithm and other knowledge inside the RFID technology is studied and analysised.Secondly,the security of plaintext stored in RFID electronic tags is analyzed.According to its weak security,a scheme of storing ciphertext in RFID electronic tags is designed.The EPC are stored in a specific area after being encrypted.The ID is digitally signed and stored in a specific area.Encryption can prevent the leakage of privacy.The digital signature ensures the integrity of the information and confirms the identity of the sender.Thirdly,three kinds of security authentication protocols designed respectively for message transmission and message authentication between tags and readers.Based on the shared key authentication protocol,the label and reader use Diffie-Hellman protocol to share key and charge random numbers,which can resist attacks such as replay.The dual secure authentication protocol based on public key certificate,the public key certificate contains information such as public key and identity,the tag and the reader use the other's public key and their own private key to double-encrypt the information.By this way,we can not only strengthen the confidentiality butalso strengthen the legitimacy of both communication parties.The security authentication protocol based on the NTRU algorithm achieve two-way certification between lags and readers.Finally,according to the scheme of label ciphertext storage and authentication protocol,the application scheme of RFID anti-counterfeiting technology is proposed,the label information is stored and transmitted as ciphertext is come true.RFID security authentication protocol is realized,and those can improve the security of RFID systems,thereby enhancing the level of anti-counterfeiting technology.
Keywords/Search Tags:RFID, Security, Ciphertext, Digital signature, Authentication protocol
PDF Full Text Request
Related items