Font Size: a A A

Research And Design Of Security Protocols For RFID System

Posted on:2018-09-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:X C YangFull Text:PDF
GTID:1318330512983084Subject:Information security
Abstract/Summary:PDF Full Text Request
Radio-Frequency Identification(RFID)technology has been widely used in areas such as industry,agriculture and commerce so far.A typical RFID application system includes tags,readers and back-end server.Because RFID tags are resource-constrained devices and communicate with reader wirelessly,it is easy for adversaries to attack tags in an RFID application system.For example,adversaries would outline a person's movements and preference by distinguishing and tracking tags which attached to the person,or eavesdrop on the authentication sessions between a tag and its reader and analyze the transmitted data,in order to obtain trade secrets or impersonate tags to pass the verification of the application system.To address the above problems,physical protections and security protocols can be employed.The former includes tag killing,Faraday cage and signal disturb,et al.,but this kind of measure is not flexible and needs more cost in application.The latter measure is to design security protocols based on cryptographic technology,and it has advantages of flexibility,scalability and lower cost for RFID application.At present many RFID protocols have been proposed,which play an important role to promote the secure use of RFID technology.However,the problems of tag privacy and data security have not yet been better solved because of lacking security models,protocol's flaw or low encryption strength in some protocols.This thesis is concentrated on the research on public key cryptography-based RFID security protocols,which include tag authentication protocol,tag ownership transfer protocol and privacy model for tag ownership transfer in addition to tag group proof protocol.The contents and innovations of this thesis can be summarized as follows:1.A privacy-preserving RFID authentication protocol based on elliptic curve cryptology(ECC)is proposed,and formal proofs for tag privacy of this protocol are given under a proposed tag privacy model.We also analyze the common security properties of this protocol,and compare this protocol with other recently-proposed ones,which are also based on ECC.The results of analysis between our protocol and others show that our protocol is excellent from an overall evaluation of tag computation cost,communication cost and tag privacy protection,and our protocol is suitable for open scenarios that require high security.2.A tag privacy model for tag ownership transfer is proposed in order to analyze privacy leakage caused by tag ownership transfer.The proposed model captures attacker's abilities to get reader's private key and other abilities such as launching protocols,observing authentication sessions,sending messages,corrupting tags and transferring tag ownership to others.We also proposed a prototype protocol based on public key cryptography.The analysis shows that our prototype protocol is privacy-preserving under the proposed model and meets other security requirements.3.We analyze an ElGamal-based authentication protocol and show it is vulnerable to attack on tag privacy,and give an improvement for this protocol.We also proposed a mutual authentication protocol based on ElGamal encryption scheme,which needs reader/server to perform encryption and decryption but tag perform operations like hash operation and lightweight symmetric encryption algorithms.The proposed protocol is suitable for scenarios that require higher security.4.A tag group proof protocol is put forward based on ElGamal encryption scheme,which needs reader/server to perform cryptographic operations but tag perform lightweight operations like hash operation.This protocol is suitable for severely resource-constrained tags and for applications with lower privacy requirement.However,tag privacy can be achieved if this protocol works with our proposed authentication protocol.
Keywords/Search Tags:RFID, security protocol, privacy protection, tag authentication, tag ownership transfer, tag group proof
PDF Full Text Request
Related items