طراحی و ساخت سیستم ارتباط شناسایی فرکانس‌های رادیویی در مناطق نظامی

نویسندگان

1 کارشناسی ارشد مخابرات رمز دانشگاه شهید ستاری

2 دکتری مخابرات، استادیار دانشگاه هوایی شهید ستاری

چکیده

فناوری شناسایی از طریق امواج رادیویی(RFID)، یک فناوری جدید است که به هدف شناسایی و احراز هویت اشیاء و موجودات زنده به کار گرفته شده و به دلیل مزایای و اهداف گسترده دیگری همچون کاهش هزینه‌ها، افزایش سرعت و انجام احراز هویت در مقیاس وسیع، فناوری RFID مورد توجه سازمان‌ها، صنایع مختلف و به‌خصوص نیروهای نظامی قرارگرفته و روزبه‌روز بر دامنه کاربران آن افزوده می‌شود. ازاین‌رو بررسی جنبه‌های امنیتی این فناوری و میزان امنیت پروتکل‌های به‌کارگیری شده برای انجام احراز هویت، یک نیاز ضروری برای کاربران مختلف آن است. در این مقاله پس از یک آشنایی کوتاه با سامانه‌های RFID، این سامانه‌ها ابتدا مورد تحلیل امنیتی قرار خواهد گرفته و نتیجتاً در جهت افزایش امنیت و بومی‌ کردن سخت‌افزار و نرم‌افزار سیستم‌های ارتباطی، یک مدار RF موجود در سیستم RFID طراحی و ساخته‌شده است.

کلیدواژه‌ها


عنوان مقاله [English]

Design and construction of radio frequency identification communication system in military

نویسندگان [English]

  • Esmaeil Safdarian 1
  • Jafar Khalilpur 2
1
2
چکیده [English]

Radio frequency identification technology (RFID) is a new technology designed to identify and authenticate object and organism. Due to its benefits and other broad goals such as reduction of costs, increasing speed and performing authentication on a large scale, it has attracted the attention of organizations and different industries, and particularly military forces and its users are growing every day. Therefore, investigating the security aspects of the technology and the security level of employed protocols for authentication purposes is a crucial need for different users. In this paper, after a short acquaintance with RFID system, initially, the system will be analyzed on security basis, and consequently, one RF circuit in the RFID system will be designed and built to increase security and localize hardware and software communication system.

کلیدواژه‌ها [English]

  • identification friend or Enemy system
  • radio frequency identification
  • military Regen
  • منابع

    • Jianguo Hu and B. Deming Wang and C. Yanyu Ding and D. Jun Zhang and E. Hongzhou Tan,(2010) Design and Implementation of Intelligent RFID Security Authentication System, IEEE International Conference on RFID-Technology and Applications, Guangzhou, China, pp.286-290, 17-19 June.
    • R.K.Pateriya and B. Sangeeta Sharma, (2011) The Evolution of RFID Security and Privacy: A Research Survey, IEEE International Conference on Communication Systems and Network Technologies, pp.115-119,.
    • Jack Yu and B. Gul Khan and C. Fei Yuan,(2011) XTEA ENCRYPTION BASED NOVEL SECURITY PROTOCOL, IEEE Electrical and Computer Engineering, , Canada.
    • Wang Qinghua and B. Xiong Xiazhong and C. Tian Wenhao and D. He Liang,( 2011) Low-cost RFID: Security problems and solutions, IEEE, pp.58-62.
    • Cristina Hurjui and B. Adrian Graur(2011) Analysis of RFID security and privacy by means of identification and authentication protocols, IEEE, pp.315-320,.
    • Behzad Malek and B. Ali Miri and C. Luis Orozco-Barbosa(2011) Backward Link     Authentication For RFID Tags, IEEE International Conference on FID-Technologies and Applications, pp.348-352,.
    •  A. Yan Fang and B. Liu BingWu and C. Huo LingYu and D. Yang Xi(2010) Research and Design of a security Framework For RFID system, IEEE International Forum on Information and Applications, pp.443-445,.
    •  A. N.W.Lo and B. Kuo-Hui Yeh(2010)De-synchronization Attack on RFID Authentication Protocols, IEEE, pp.566-570, Octobr 17-20,.
    • A. A.Ahmadpour and B. A.Ahadpour Shal and C. M.Ziabari(2009) A Novel formulation of  Hamming Code, IEEE, pp.808-811,.
    •  A. Hyun-Seok Kim and B. Jung-Hyun oh and C. Jin-Young Choi, Analysis of the RFID Security Protocol for Secure Smart Home Network, IEEE International Conference on Hybrid Information Technology, vol. 2, pp.356-363, 2006.
    •  A. Chunuhui Piao and B. Zhenjiang Fan and C. Chunyan Yang and D. Xufang Han, (2010)Research on RFID Security Protocol Based On Grouped Tags and Re-encryption Scheme, IEEE, pp.568-572,.
    •  A.Syeda Iffat Naqvi and B. Adeel Akram(2011) Pesudo-random Key Generation for Secure  HMAC-MD5, IEEE, pp.573-577.
    •  A.Zhao Li Ping and B. Shu Qi Liang and C.Lai Xiao Liang(2011) RSA Encryption and Digital Signature, IEEE International Conference on Computational and Information  Sciences, pp.369-372.
    •  Ohkubo, M., Suzuki, K., Kinoshita, S.( 2003) "A cryptographic approach to a ‘privacy-friendly’ tag", RFID PrivacyWorkshop, MIT.
    •  Piramuthu, S.(2007)"Protocols for RFID tag/reader authentication", Decision Support System, University of Florida,.
    •  Yang, J., Park, J., Lee, H., Ren, K., Kim, K.( 2005) "Mutual authentication Protocol for low-cost RFID", Proceedings of the Workshop on RFID and Light Weight Cryptography.
    •  Piramuthu, S(2010)"RFID mutual authentication Protocols", Decision Support System, University of Florida.
    •  Weis,S. A., Sarma, S. E., Rivest, R., Engels, D. W.( 2004) "Security and Privacy aspects of  low-cost radio frequency identification systems", 1st Security in pervasive computing  LNCS,.
    •  Lee, S., Asano, T., Kim, K.( 2006) "RFID Mutual Authentication Scheme based on Synchronized Secret Information", Symposium on Cryptography and Information Security, Hiroshima, Japan.
    •  Luo, Z., Chan, T., Li, J.S.(2005) "A light weight mutual authentication protocol for RFID networks", Proceedings ofthe IEEE International Conference on e-Business Engineering,.
    •  Piramuthu, S.(2010) "RFID mutual authentication Protocols", Decision Support System, University of Florida.
    •  Piramuthu, S.(2010) "RFID mutual authentication Protocols", Decision Support System, University of Florida.
    •  Lee, S., Asano, T., Kim, K.( 2006) "RFID Mutual Authentication Scheme based on Synchronized Secret Information", Symposium on Cryptography and Information Security, Hiroshima, Japan,.
    •  Piramuthu, S.(2007) "Protocols for RFID tag/reader authentication", Decision Support System, University of Florid.,
    •  Yang, J., Park, J., Lee, H., Ren, K., Kim, K.( 2005) "Mutual authentication Protocol for low-cost RFID", Proceedings of the Workshop on RFID and Light Weight Cryptography.
    •  Han, S., Potgar, V., Chang, E.( 2007) "Mutual authentication protocol for RFID tags based on Synchronized secret information with monitor", Proceedings of ICCSA, LNCS.
    •  Piramuthu, S.( 2010) "RFID mutual authentication Protocols", Decision Support System, University of Florida,.
    •  Deursen, T. V., Radomirovic, S.( 2009) "Security of RFID Protocols-A case study", Electronic Notes in Theoretical Computer Science.
    •  Pietro, R.D., Molva, R.(2010) "An optimal probabilistic solution for information confinement, privacy, and security in RFID systems", Journal of Network and Computer Applications.
    •  S. Garfinkel, and B (2005)Rosenberg, "RFID: Applications, Security, and Privacy", 1st edition, Addison-Wesley Professional.
    •  M. Nilsson, J. Hallberg(2002) "Positioning with Bluetooth, IrDA and RFID", Master’s Thesis of Luleå University of Technology, Sweden.
    •  T. Haver(2006)"Security and Privacy in RFID Applications", Master’s Thesis of Norwegian University of Science and Technology, Norway