Font Size: a A A

An Authentication Protocol For RFID Privacy Protection And Its Application Research

Posted on:2009-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:Z H ChangFull Text:PDF
GTID:2178360278980815Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is an automatic identification technology. Compared with barcode technology, RFID system can be used widely, since RFID system can identify lots of tags quickly through radio frequency (RF) with neither physical nor visual contact. Currently, RFID systems are used in many areas, such as identity identification, forgery prevention, supply chain management, public traffic management and military affairs etc., and afford facilities for people's work and life.However, RFID systems can cause security and privacy problems if the tag offers no effective access-control mechanisms. RFID systems may induce the leakage of companies' information and individuals' privacy since the RFID tag emits its data by RF. For example, a dishonest company may try to collect information of competitive company, and an adversary may try to get knowledge of products which an individual user carries or track a user by utilizing responses from a tag. With the extension of the application areas, the problems of RFID security and privacy become obstacles to further development and application of the technology, and these problems are also getting more and more concerns. Because of the restricts of cost, storage and computing capability of RFID tag, many traditional cryptographic arithmetics can not be used to resolve the problems, so lightweight arithmetics must be considered. In this thesis, some researches on how to enhance security and privacy of RFID system and innovative application of RFID tags are done. The main work and innovations are as the followings:1. The characteristics and the threats to security and privacy of RFID system are analyzed, and then the requirements of RFID security and privacy are analyzed and defined. Three kinds of mechanisms about solving RFID security and privacy problems, including physical, cryptograp-hical and political ones, are analyzed and summarized.2. By adopting zero-knowledge proof idea, a RFID privacy-preserving mutual authentication protocol (PMAP) is designed. The formal security proof of PMAP is given by using the protocol composition logic (PCL). The overheads of computing and storage of PMAP are fit for RFID system.3. By applying PMAP, a verifiable threshold secret sharing scheme in RFID tags group is addressed, and its security features are analyzed and formal security proof is given by using PCL. According to the characteristics of RFID system, the implementing principle of "first authenticating then reading" is suggested.4. By using the idea of constructing PMAP's zero-knowledge authentication message, an authentication based coexistence proof scheme for RFID multi-tags and its two extensions are addressed. Compared with existing schemes, it has preferable security features without causing more computing and communication overhead.
Keywords/Search Tags:RFID, authentication, zero-knowledge proof, protocol composition logic, secret sharing, coexistence proof
PDF Full Text Request
Related items