Dissertation > Excellent graduate degree dissertation topics show

Security and Privacy Protection Research of RFID Application System

Author: YangFan
Tutor: DaiShangPing
School: Central China Normal University
Course: Applied Computer Technology
Keywords: Hash chain Pre-calculated Identification Update
CLC: TP309
Type: Master's thesis
Year: 2011
Downloads: 97
Quote: 1
Read: Download Dissertation

Abstract


There are many kinds of security and privacy protection of RFID systems, security authentication protocol which is the best cost-effective, so the most widely used. Most of these security authentication protocol is the highlight of the two main ways: a hash lock program, need a random number generator; the other hash chain solutions, without the use of a random number generator. The hash lock program identification process requires a random number, so it can not forecast the future output of the label; hash chain solutions can be predicted. The existing the hash chain solutions for this feature, find and lookup table search order to achieve recognition and subsequent calculation in order to achieve server (general) on the back-end and multi-reader system scalability, Evan static program to improve sequential search time required to spend the Evan's dynamic program to improve the memory required to spend a lookup table search. On this basis, designed to improve the hash chain solutions to enable the program to be improved at the same time spending time and memory. This paper first analyzes the causes and threats to the security and privacy issues of RFID application systems, and the integrity of the security policy of the RFID application systems. Designed based the hash chain improvement program, this program is for the server instead of electronic tags to achieve improvements can greatly improve the time and memory costs, can solve the problem of the two privacy attacks, on the basis of the existing programs, especially against the attacker by the illegal reading recognition log to track user behavior attack. Original hash chain solutions, server-side need to use the pre-calculated, the improved program of this pre-calculated optimized, also designed a pre-calculated value is how to efficiently update. Finally a reasonable assessment of the analysis, obtained different scale RFID application system environment improvement program with four scenarios (sequential lookup scheme, lookup table search program, Evan static program and the dynamic program) to do the comparison, the memory usage, as well as pre-calculated authentication and update time spent fine experimental results. The main work done in this paper are: 1. Existing security protocol based on hash chain program elaborated through analysis, problems exist when they are executed on the server. The server uses the different data structures with existing programs. Designed the improved algorithm based on hash chain, the optimized algorithm on the server side of the pre-calculated, and to achieve a more efficient update of pre-computed values ??identify, improve the efficiency of the implementation of the server, reducing the cost of memory . 4. Reasonable on the basis of the experimental analysis and evaluation, and come to the effectiveness of the programs of the different scale RFID application system environment.

Related Dissertations

  1. Research on Vector Control System of Induction Motor Based on DSP,TM346
  2. Design and Simulation of UHF RFID System Based on the Protocol of EPC C1G2,TP391.44
  3. The Software Component Modeling Method Based on Feature and Its Application in VMI Management System,TP311.52
  4. The Study of Domain Dictionary Construction Based on Web,TP391.1
  5. The Study on Rhinoceros Horn and Its Imitation,TS932.2
  6. Characterization of Corn Lectin and Application to Screen of Growth-promoting Bacteria from Corn Rhizosphere,S513
  7. Study on Antioxidant Components of Tibetan Medicine Sanguo Tang San,R29
  8. Study of Synchronous Generator Excitation Control Based on Neural Network Identification,TM31
  9. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  10. Animal products quality safety and security regulation of RFID systems,TS201.6
  11. The Identificationand Rapdanalysis of Wheat Root Lesion Pathogens in Henan Province,S435.121
  12. Isolation and Identification of Infectious Bronchitis Virus and Sequence Analysis of Its S1 Gene and N Gene,S852.65
  13. Identification of Marine Sreptomyces Sp. GY-4 and Researches on Its Antimicrobial Substances,Q936
  14. Research on Identification System of Cashmere and Wool Fiber,TS101.921
  15. Study of Isolation and Identification on Antimicrobial Substances Produced by Lactobacillus Acidophilus NX2-6,TS201.3
  16. Screening and Evaluation of Antagonistic Organisms Against Pyricularia Grisea and Xanthomonas Oryzae PV.Oryzae,S435.111.4
  17. Evaluation and QTL Analysis for Crown Rot Resistance in Wheat,S512.1
  18. Isolation and Identification of a Probiotic Strain Capable of Producing Glycerol and Optimization of Fermentation Conditions for the Strain,S823.5
  19. Cloning, Identification and Eukaryotic Expression of Variable Region of Monoclonal Antibodies Against Chelated Mercury, Copper and Zinc and Three Dimentional Modeling of Recombinant Antibody,X171.5
  20. Research on Heat Tolerance Identification and Cloning of Heat Tolerant Gene Fragment in Non-Headingchinese Cabbage (Brassica Campestris SSP. Chinensis Makino),S634
  21. Identification and Robustness Analysis of Nonlinear Hybrid Dynamical System Concerning Glycerol Transport Mechanism,TQ223.162

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile