| RFID (Radio Frequency Identification) is a form of automatic identification and data capture technology. With the benefits to improve productivity and reduce operation cost, RFID technology has recently been seen a great increase in a wide variety of business information systems, such as supply chain management to replace barcode, access control in airports, baloratories.etc. As a result, billions of tags will be displayed within the next years. RFID is a technology using radio waves to identify items, therefore RFID system is easy to be attacked and it is difficulty for RFID system to detect operation remotely and find being attacked. RFID systems can be very complex, having a number of different risks, we focuse on RF subsystem risk in this thesis. However, the downside in business applications is the problem caused by data security and privacy. There are two mechanisms to solve RFID security problems:one is physical mechanism, and the other is authentication technique based on cryptography. We prefer to the latter. After researching on commonly used security protocols, we propose a unilateral randomly authentication protocol on the basis of one-way hash function for low-cost RFID tags in this thesis. Compared with several existing protocols, the protocol we design enhances the security of RFID communication systems. What's more, we propose a logical analysis of the security protocol we design in this thesis. Small memory size and low computering power stand in the way of RFID technology develoing. They reduce many problems, like those tages can not be applied to high-level security applications, therefore we design a strong authentication for RFID system using AES algorithm within smart tags. We model the whole operating procedure of the proposed protocol in a typical RFID system by java and analysis against attacks such as eavesdropping and DoS. With internet developing deeply, we can not solve information security well by just counting on well encryption algorithm, whilest we need to use security theory-security method and security technology. So the security of the protocol is one of the key problems in the internet security. Logical analysis is becoming a hot dot in the information security field. We choose BAN logical language to prove the correctness of the protocol from lots of methods. |