tailieunhanh - Radio Frequency Identification Fundamentals and Applications, Bringing Research to Practice Part 10
Tham khảo tài liệu 'radio frequency identification fundamentals and applications, bringing research to practice part 10', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | Evaluation of Group Management of RFID Passwords for Privacy Protection 173 b. The system must use as little item information as possible for the identifier of RFID tags to protect possession privacy. c. The system must avoid using unique IDs for the identifier of RFID tags as much as possible to protect location privacy. a Common RFID Password RFID interrogator Password generator password C password A password B RFID tag groupl - password A RFID tag group2 f password B RFID tag group3 t password C b Group RFID Password Fig. 1. Systems in which interrogators access RFID tags by using RFID passwords 3. An RFID system that generates group RFID passwords Group RFID password generation method An RFID system that generates group RFID passwords only allows authorized interrogators to access RFID tags and allows those interrogators to read or write data in the RFID memory. Each RFID tag receives an RFID password from an interrogator and authenticates the interrogator . judges whether the interrogator is authorized for access. This system sets data called PASS KEY for generating a different RFID password for every group of tags and sets the RFID password as an RFID tag. A group RFID password generation algorithm that finds the right RFID password for each group of RFID tags and sends it to the RFID tag is mounted in an authorized interrogator. The parameters of the grouping RFID password generation algorithm are a master key and a PASS KEY written in an RFID tag. Figure 2 is a flow chart of the procedure for generating and managing the group RFID passwords. In the preparation stage a user chooses a random number as the PASS KEY. The group RFID password generation algorithm calculates this PASS KEY by using a function with collision resistance and pre-image resistance . a hash function with a master key. The calculation result that this algorithm outputs is used as the group RFID password. The system sends and sets selected PASS KEYs and the generated group RFID .
đang nạp các trang xem trước