Font Size: a A A

Research And Design For Security Protocols Of The Internet Of Things Electronic Tags

Posted on:2014-12-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:F XiaoFull Text:PDF
GTID:1268330401463107Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of technology of the IoT (Internet of things), electronic tags and RFID (Radio Frequency IDentification) system have already played an important part in the age of information. RFID system brings much more convenience to our life and improves production efficiency, meanwhile, the problems of electronic tags’ security and privacy preserving also burst out. The RFID system operates in the IoT’eniverment which is heterogeneous and complex, so the low cost and resource-constrainted electronic tags are vulnerable to malicious attacks launched by the adversary. Now the security issue has already become the chief obstacle to the large scale application of RFID system.To deal with the the more and more serious security eniverment of the IoT, this paper design security protocols which are applied to IoT’s eniverment and suitable for RFID system’s demands in reality by using proper cryptography technology, and give the theory analyses of the designed security protocols with formal methods. As a result, it is proved that the proposed protocols can meet the special safety requirements of RFID system and protect electronic tags’information security and privacy.The main research work can be summarized as follows:(1) Research and deign for provable secure mutual authentication protocol of RFID system under standard model. To deal with the problems of RFID system’s security and privacy preserving, the security requirement for mutual authentication protocol of RFID system is analyzed firstly, then a mutual authentication protocol is proposed in the standard model. The reduction method is using to prove that the security of new protocol is based on the indistinguishability between pseudo-random function and real random function. The implementation of proposed protocol only requires lightweight pseudo-random generator and vector dot product operation and provides higher security and efficiency. So the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.(2) Research and deign for secure protocol of EPC (Electronic Product Code) system based on UC (Universal Composable) model. A security and performance anslysis of a lasted security protocol for EPC system is given and the result shows the lasted protocol had no resistance to replay attack and did not resolve the problem of data forge and tag’s location privacy. So an improved protocol is then proposed to protect RFID system from all major attacks. In order to guarantee the concurrent security of EPC system, the the ideal functionality of EPC system is formally defined with the UC framework. Then a secure protocol for EPC system under UC model is proposed and the analysis of security and performance of the proposed protocol is given, in comparison with other protocols, the results show that the proposed protocol is UC secure.(3) Research and deign for secure search protocol of RFID system based on strand space model. A lasted secure search protocol of RFID system is analyzed, and it is proved that the lasted protocol was not resistant to the replay attack, and the locations of tags and reader could be locked by the adversary. In order to solve the RFID system’s safe and precise search problem among the mass amounts tags, the basic strand space model is extended and a conception of "unreplayable" also introduced to analyze the session information script in secure search protocol of RFID system. Then a secure search protocol of RFID system is proposed and a security analysis is also given based on the extended strand space model. By comparing to other protocols, the results show that the proposed protocol eliminates the security risks and is quite suitable for low cost tags. (4) Research on privacy of electronic tag’s ownership transfer protocol in the eniverment of supply chain. An anslysis of security and privacy problems exit in the electronic tag’s ownership transfer protocol is given fistly; then based on the application environment of supply chain, the basic space model is extended and the space model of privacy of electronic tag’s ownership transfer protocol is proposed, and the determinant theorems and rules of forward privacy, backward privacy and key’s security are also defined. Then the theorems and rules are introduced to analyze the security and privacy of two representative electronic tag’s ownership transfer protocols. The results show that both of the protocols have the backward pricacy problem and risk of key’s lekage.
Keywords/Search Tags:the Internet of things, electronic tags, security protocol, formal analysis, information security, privacy preserving
PDF Full Text Request
Related items