Dissertation > Excellent graduate degree dissertation topics show

RFID Authentication Protocol Based on Hash Function

Author: WangJuan
Tutor: ZhangXueJun
School: Nanjing University of Posts and Telecommunications
Course: Circuits and Systems
Keywords: Radio Frequency Identification (RFID) passive Tag authentication protocol security Hash function
CLC: TP391.44
Type: Master's thesis
Year: 2012
Downloads: 31
Quote: 0
Read: Download Dissertation

Abstract


Radio Frequency Identification (RFID) is a technology for non-contact automated identification of objects, with characteristics of large data storage capacity and environmental adaptability. RFID tags are readable without line-of-sight contact and without precise positioning. With its own advandtages of RFID technology can be widely used in the fields of traffic control, Electronic Article Surveillance gate, supply chain, disease traceability and waste collection etc. RFID technology may improve efficiency and reducing costs for the business or organization.However, in practical applications, the security and privacy of RFID systems is a key question which may confine the popularization of RFID technology, and RFID security issue has attracted more and more attention to propose efficient ways and means. There are two important factors that impact the function of security technique. On the one hand, RFID Tag has very limited power, storage capacity and computing ability. On the other hand, the communication signals between the Tag and Reader are transmitted by wireless channel, which is exposed to attackers.In this paper, we propose a strong authentication protocol based on Hash function for RFID system—SAP. The proptocol achieves mutual authentication between the Reader and Tag, can provide Tag anonymity, indistinguishability and untraceabilty, also offers forward security. It can resist replay attack and desynchronism attack. The analysis and formalize prove indicate that the protocol has preferably security and efficience. Moreover, the protocol supports Tag agent and ownership transfer, with Tag agent the scalability of RFID system probably improved. We also propose an authentication protocol of RFID system for ownership transfer. The propose protocol can protect security and privacy for the old owner, and resist Tag traceability of the new owner.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  6. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  7. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  8. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  9. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  10. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  11. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  12. Health protection of migrant workers,D412.6
  13. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  14. Comprehensive Evaluation of Ecological Security of Land Application,X826
  15. Study on Evaluation Index System for Land Ecological Security,X826
  16. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  17. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  18. Genetically Modified Food Ethics,B82-05
  19. On the systematic construction of the Chinese Communist Party democracy,D262.11
  20. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1
  21. Research on a Fire-fighting Shell for Towers,TU892

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Information processing (information processing) > Pattern Recognition and devices > Optical pattern recognition devices
© 2012 www.DissertationTopic.Net  Mobile