Font Size: a A A

Research On Security Protocols In Radio Frequency Identification Systems

Posted on:2015-10-21Degree:DoctorType:Dissertation
Country:ChinaCandidate:W JieFull Text:PDF
GTID:1228330479479529Subject:Military communications science
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID) is an automatic identification technology rising from 1980 s. It has been viewed as one of the most important technology in the 21 st century, and has been widely used in a series of real-life applications, such as supply chain management, contactless credit card, inventory control, etc.The rising of RFID has brought an evolution of military automation. Military logistic efficiency and combat power can be greatly enhanced by fast, accurate, and large-scale RFID systems. Many countries such as China, USA, Japan, etc, have been striving to develop their military RFID systems by increasing investments, unifying standards, and expanding application areas.However, there are still many security and privacy concerns about RFID applications. In chapter 2, typecial military RFID applications such as area management, battlefield medical, warehouse management, supply transport, and tactics Io T, are analyzed. Security and privacy threats in these applicaitons are divided into three categories, i.e. data storage, access control, and mobile privacy.In chapter 3, mobile privacy is addressed. Most server-less RFID authentication and searching protocols reveal mobile privacy of portable readers. Lee et al.’ server-less RFID searching protocol is improved in chapter 3. A general improvement method(GIM) is proposed to enhance similarly vulnerable protocols. X1, which is a server-less RFID authentication protocol preserving mobile privacy, is proposed.In chapter 4, data storage is addressed. A new problem of RFID authentication is focused for the first time. i.e. how to safely authenticate tags based on malicious backend servers and/or unsecure backend databases. To solve the problem, X2, which is an RFID authentication protocol based on an encrypted hash table, is proposed.In chapter 5, access control is addressed. One problem is about authenticating users of RFID devices. The other is about offline transferring tags’ ownership. A new architecture of RFID protocols is proposed based on tag owner assisting(TOA). X3, which is an offline RFID authentication and ownership transfer protocol, is proposed.In chapter 6, A new protocol type, i.e. RFID seeking is defined. It is useful to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones. X4, which is the first RFID seeking protocol with strong security, is proposed.
Keywords/Search Tags:RFID, Mobile Privacy, Data Storage, Access Control, Mutual Authentication, Ownership Transfer, Server-less Searching
PDF Full Text Request
Related items