Font Size: a A A

Research On RFID Security Protocols Based On Hash Function

Posted on:2013-01-29Degree:DoctorType:Dissertation
Country:ChinaCandidate:J L HeFull Text:PDF
GTID:1118330371482702Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is a technology which is used to identify remoteobjects embedded with RFID tags by wireless scanning without manual intervention. RFIDtechnology is a key technology of the future IoT and has a great economical potential, and hasbeen used in various application domains. A typical RFID system is composed of a server,readers and tags.Based on wireless communication, signal broadcasting, asymmetry between forwardchannel and backward channel, the existing RFID systems are vulnerable to many securityattacks and privacy disclosure threats. Due to strictly limited calculation resources, smallstorage capacity and faint power supply of low-cost tags, it is difficult to apply an ordinaryand complicated but safe cryptographic algorithm to a RFID system and these factors arehindering the rapid spread of this technology. So designing an efficient and low-cost securityscheme for RFID systems becomes a challenging research object.Security and privacy requirements for RFID authentication protocols: tag untraceability,tag information protection, spoofing attack, replay attack, Denial of Service (DoS) attack,forward security, backward security; performance requirements for RFID authenticationprotocols: storage cost, computation cost, communication cost of each tag should becontrolled as minimally as possible.Workload of server: Scalability is a desirable property in almost any system, a scalableRFID system should be able to handle large numbers of tags without undue strain. However,in the most of the existing RFID authentication protocols, for each tag entry in turn, the servercomputes the lightweight cryptographic function that would be produced by that tag andcompares it with the received authentication application, such a costly linear search runs inO(n) time, it would potentially cause scalability issues as the tag population increases.The owner of a RFID tag may change a number of times during its lifetime. Ownershiptransfer means that the server of new owner takes over tag authorization, such transfer should meet requirement: after tag ownership transfer, old owner cannot read the tag using remainedtag information so as to trace new owner s behaviors, while new owner cannot trace oldowner s past behaviors by using received tag information.According to whether the server and a tag update the identifier or not in an authenticationaccess, RFID protocols are divided into dynamic ID mechanism and static ID mechanism.Dynamic ID mechanism is always used in the circumstance that the ownership of an IDneeded to transfer.Presently, for the reason of convenient using and hardware cost, lightweight methods likeHash, PRNG and CRC are used wildly in design of RFID authentication protocols. Especially,Hash-based protocols have been researched actively.Especially, there is no universal applicable solution for RFID systems, the security levelswould depend on specific application, namely RFID systems should attain balanced targetbetween security and performance.The main contributions of this paper is to propose a BRS-based approach for modelingRFID untraceability and progress some research on RFID security protocols based on Hashfunction for low-cost RFID systems.(1)The theory of Bigraphical Reactive Systems has been proposed as a topo-graphicalmeta-model for mobile, distributed agents that can manipulate their own linkages and nestedlocations. Untraceability is the most important aspect of RFID security. A BRS-basedapproach for modeling RFID untraceability is provided in this paper. Elements in a RFIDauthentication protocol can be represented as bigraphs, communications between elementscan be represented as reaction rules. RFID untraceability can be represented as behavioralcongruences. We take air interface protocol as a case study and show the usability of thisapproach.(2)A novel scheme called index inner table used in the reader. Index inner table mayefficiently utilize calculation capacity and storage space of RFID reader to construct a filterwhich can sift authentication applications from tags, thus, it could alleviate workload of theserver and resist replay attack from an adversary. The structure, filter algorithm, update andsorting algorithm, eraser algorithm of index inner table have been introduced detailedly in thispaper. However, the real-life application circumstances are various and complicated, sorevised index inner table have been proposed that can be applied in different filter modesaccording to various real-life application environments.(3)An efficient lightweight RFID authentication protocol based on static ID is proposed.The protocol only requires O(1) work to identify and authenticate a tag in the server, so it is particularly suitable for the low-cost RFID systems and suitable to managing large populationof tags. The security and performance of this protocol are analyzed as well by comparing withthe related RFID authentication protocols.(4)A new security requirement for RFID authentication protocols is proposed, it is lightweight encryption function structure protection, in addition, a RFID authenticationprotocol based on static ID that can meet this new security requirement is proposed.(5)An efficient RFID authentication protocol supporting tag ownership transfer isproposed, this protocol based on dynamic ID is designed for immobile reader and onlyrequires O(1) work to identify and authenticate a tag in the server, it alleviates workload ofthe server sharply, so this protocol has well scalability. The security analysis shows that thisprotocol can resist spoofing attack, replay attack, DoS attack, and meet tag untraceability, taginformation protection, forward security and backward security; the performance evaluationsshow that this protocol is suitable for low-cost RFID systems well.(6)Mobile reader are used more and more widespread, it brings higher design require-ments for RFID authentication protocols. An efficient RFID authentication protocol isproposed, this protocol based on dynamic ID is designed for mobile reader and only requiresO(1) work to identify and authenticate a tag in the server, the security and performance of thisprotocol are analyzed as well by comparing with the related RFID authentication protocols.(7)For fulfilling the security requirement of lightweight encryption function structureprotection, a RFID authentication protocol based on dynamic ID for mobile reader isproposed, this protocol has well backward security and forward security, so it can be appliedin the application environment that has more security requirements.
Keywords/Search Tags:RFID, Security Protocol, BRS, Untraceability, Index Inner Table, Tag OwnershipTransfer, Mobile Reader, Hash
PDF Full Text Request
Related items