Dissertation
Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Information processing (information processing) > Pattern Recognition and devices > Optical pattern recognition devices

Research and Design of Confidential Carriers Management System Based on RFID

Author ShangKai
Tutor PanZuoZuo
School Lanzhou University of Technology
Course Control Theory and Control Engineering
Keywords RFID technology Confidential carriers ALOHA algorithm Cryptographic protocol
CLC TP391.44
Type Master's thesis
Year 2012
Downloads 77
Quotes 1
Download Dissertation

At present, most of the enterprises and institutions store the internal confidentialinformation in the mobile storage media, such as the laptop computer, USB flash disk andmobile hard disk. However, how to manage such confidential carriers better and to prevent theconfidential information of the carrier against the leakage, may affect the core interest of theenterprises and institutions. Therefore, management requirements of the confidential carrierswhich store the confidential information will be more and more high.This paper firstly introduces the RFID technology, and analyses the RFID systemstructure, working principle, and advantage relative to other automatic identificationtechnology; Then, aiming at the present situation of the management and the actualrequirements of confidential carriers in the enterprises and institutions, it designs aconfidential carriers management system based on RFID, starting from the overallarchitecture respectively, it discusses the hardware and software system in detail, and realizesthe function demand through the management software.In allusion to the tag collision phenomenon in the application of the RFID system, thispaper firstly analyses the reasons of the collision, and introduces several common solutions;Then, it analyses ALOHA algorithm which is dominant in prevent collision algorithms, andexplains the main characteristics; Finally, it puts forward an enhanced dynamic frame slottedALOHA algorithm for anti-collision in RFID systems, and the algorithm is validated throughthe simulation, whose results show that the proposed algorithm is effectively and accurately.At last, aiming at the security threats which may be faced in RFID system application, thispaper firstly introduces the security threats; Then, it analyses some common RFIDcommunication protocols; Finally, this paper proposes an improved Hash function RFID safeauthentication protocol to solve the security problems between the reader and electronic tags,it is shown that the protocol can effectively resist security threats, such as fake attack,retransmission attack, tracking attack and intercept attack.

Related Dissertations
More Dissertations