Font Size: a A A

The Research And Realization Of Anti-Collision Protocol And Security Authentication Protocol For RFID Tags

Posted on:2018-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2348330569986477Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet of things,RFID was widely employed in engineering application.However,because of the different demand of varies type of industry,there were some technical difficulties,such as the high cost of the system,different standard,diversity of application environment and other exoteric facts.At the same time,there are still many problems,such as hardware design,antenna RF design,propagation distance,the privacy security and anti-collision technique.The thesis was based on the research of GB/T 2895-2012 "information technology of radio frequency identification 2.45 GHz air-interface protocol",and designed a 2.45 GHz active RFID system,and the more in-depth explorations and researches were focused on tag inventory mode.Firstly,the thesis studied the existing methods of RFID standard and has performed in-depth researches on the anti-collision algorithms and security authentication protocol.Based on the analysis of probability ALOHA anti-collision algorithm and Tree shape anti-collision algorithm,a framed binary tree anti-collision algorithm for dynamic estimation of Q value was proposed by combining the advantages.And then after analyzing the present RFID security authentication protocol,the thesis achieved XOR bidirectional Identify and Hash bidirectional authentication in tag inventory mode.Secondly,the hardware was selected and determined the MCU,RF and external memory.And then the software architecture was divided into four layers: physical layer,link layer,protocol layer and application layer based on the requirement of air-interface protocol.The advantage of this architecture is that the lower layer hardware could better support the upper layer software,and it makes the system structure clearly and good robust adaptation.Lastly,the thesis designed tag inventory mode based on the air-interface protocol,the main function of this mode is to identify the tag of the coverage units of Reader signal and collect the TID.And the thesis was proposed frame binary tree algorithm to application in the state of tag anti-collision recognition,which can be efficient and fast recognize the tag.When Reader finished collect TID,the authentication need to secure communication for specific tags.Security protocols for authentication are XOR bidirectional authentication and Hash bidirectional authentication.Then,use the NI instrument to test the inventory module and safety identification module of tag system,and the experiments showed that the system achieved the expected goal,which realized the real time and met the standard requirements.
Keywords/Search Tags:radio frequency identification, anti-collision, framed binary tree algorithm, security-authentication
PDF Full Text Request
Related items