Font Size: a A A

Design And Implementation Of Security Protocol For RFID Systems

Posted on:2022-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:S Y PeiFull Text:PDF
GTID:2518306557968579Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)technology is a two-way data transmission technology that communicates through radio frequency signals of a specific frequency.It can realize the function of automatic,non-physical contact automatic identification.With the continuous promotion of RFID technology,it has gradually become one of the core technologies to promote the development of the Interent of Things.Different from the traditional indentification technology,it has the advantages of non-contact,convenient and accurate information reading,fast speed,long service life,strong antiinterference and so on.At present,RFID technology has been applied to many fields,including access control system,logistics management,traffic control system and so on,playing an increasingly important reason to hinder its development.At the same time,in the process of RFID tag application,there is the problem of ownership transfer.How to ensure that the tag can safely carry out ownership transfer is also an important problem to be solved.In view of the research on the security protocol of RFID technology at the present stage,according to the characteristics of RFID tags with low cost and low computing power,this thesis mainly proposes the security protocol for RFID systems from two aspects of security authentication and label ownership transfer.The main research contents are as follows:1.A secure authentication protocol based on dynamic ID and PUF is proposed.Due to the low cost of RFID tags will limit the computational storage capacity of the tags,the traditional symmetric encryption and asymmetric encryption and other complex encryption algorithem can not be applied to the RFID authentication systems.This thesis proposes a secure authentication protocol based on dynamic ID and physical unclonable function PUF.By introducing two cryptographic primitives,hash function and PUF,and with the help of random numbers generated by reader and tag,the data are encrypted in every communication process of the protocol.At the same time,tag information and key information are updated after each round of authentication to ensure the security,privacy and robustness of the protocol.Through GNY formalized logic,the reliability of this protocol is proved and it can effectively resist common attack types in RFID authentication process.2.This thesis proposes a cloud server-based RFID tag ownership transfer protocol.With the maturity of cloud computing technology,it has become a new trend to use cloud server to replace the traditional server to build RFID systems.At the same time,in the application scenarios of RFID systems,such as the most common logistics industry,with the transfer of ownership of goods,the ownership of RFID tags attached to goods also needs to be changed accordingly.The RFID tag ownership transfer protocol proposed in this thesis mainly includes three stages,namely initialization stage,authorization stage and key update stage.After each round of tag ownership transfer through two-way authentication between the old owner and the tag to be transferred,the owner and the tag update the key and owner identity information,and delete the message record about the old owner reader in the cloud server database.This not only ensures a successful transfer of ownership,but also ensures that after the transfer of ownership,the new owner will not be able to obtain the interaction information between the tag and the old owner.The security and efficiency of the protocol are proved by theoretical analysis and experimental simulation.3.This thesis designs and implements an RFID security management system based on B/S architecture,which can be accessed only by browser and no longer needs to install special RFID equipment software.It can easily use different types of equipment to access the network,and can manage the system at any time.The management system is designed according to the security protocol proposed in Chapter 3 and Chapter 4,and through the actual test results,it is proved that the functions of the system can be used normally and meet the requirement of practice applications.
Keywords/Search Tags:Radio Frequency Identification, Security Certification, Cloud Server, Transfer of Ownership
PDF Full Text Request
Related items