Font Size: a A A

Research On Secured Encryption Algorithm Based On RFID Vehicle Access Control System

Posted on:2016-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2272330467472762Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Over the past decades, the rapid economic development promotes a remarkable increment on motor vehicles, and various applications on vehicle management are becoming a hot research topic of every country, such as unmanned driving system, intelligent transportation system and vehicle access control system. Vehicle access control system as one of entrance guards has the capability to control the access of the vehicle and ensures data security. However, current vehicle access control systems can only realize the verification of vehicle identity but they cannot verify the routes of the vehicle. Thus, this thesis designs two new encryption algorithms based on RFID vehicle access control system so as to ensure the system’s ability to verify the vehicle’s routes effectively in spite of distinguishing the vehicle’s identity.This thesis first analyzes the characteristics of the existing vehicle access control systems and RFID technology, and raises a new system model aiming at the new requirements on the security control of current vehicle access control systems. The proposed system changes the deployment of tags and readers:RFID readers are installed on vehicles, while RFID tags are deployed on road surfaces. The vehicle will record the route information automatically while driving and encrypting the information till vehicle arriving at the destination and then report the route data.To ensure the safety of the system we proposed, we design two novel algorithms in this thesis:key cloaking method and iterative-disorder encryption algorithm to protect the system against the attackers from both outside and inside. The key cloaking method is designed to identify the authentication of vehicles and drivers. This algorithm hides and protects the real secret key by introducing several interfering keys that even if the vehicle is forcibly occupied by the attacker, it cannot pass the identity verification of the system because attacker couldn’t choose the real key. The iterative-disorder encryption algorithm is used to verify vehicle travel path and prevent the drivers from tampering the reported route. This algorithm changes the regularity of ciphertext block in tradition methods. That means, each time the ciphertext block is placed before or after the newly generated ciphertext randomly. If drivers change the travel path which is recorded automatically, the result of decryption will be garbled. Therefore, we can protect the integrity and the truthfulness of the route.Then, simulation of the proposed two algorithms is given and we make an analysis of the result. The result shows that the two methods could verify the identity of vehicles and drivers, as while as effective and achieve the purpose of route verification. Compared with traditional access control systems, the systems designed in this thesis not only increase the function of route verification, but also greatly enhance the security of the entire system.Finally, a summary of the study is give.In addition, we point out the future work related to this thesis.
Keywords/Search Tags:Vehicle access control, RFID systems on roads, Encryption algorithm, Identity verification, Route encryption
PDF Full Text Request
Related items