Font Size: a A A

Hash Of Rfid-based The Static Id Privacy Certification Agreement Tag Ownership Transfer Agreement With The Two-party Privacy Protection Research And Design

Posted on:2013-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:X YinFull Text:PDF
GTID:2218330374465168Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Radio-frequency identification (RFID) is the use of a wireless system which uses radio-frequency electromagnetic fields to transfer data from an RFID tag attached to an object, for the purposes of automatic identification of the object. Since1990s, RFID has been put forward all over the world due to its huge superiority of non-contact.However, it is the use of wireless non-contact that makes RFID system possibile to read personally-linked information without consent. This has raised security concerns. The study and design of RFID security mechanism is highly critical and necessary for ensuring security of RFID system.The main creative studies in this thesis include:(1) A hash-based privacy-preserving RFID authentication protocol is proposedMost of the existing RFID authentication protocols have failed to resist the malicious tracking of RFID tags in public places, and they suffer from the Denial of Service (DoS) attacks on the back-end servers and other security risks. Based upon the above-mentioned RFID authentication protocols, we do further research on the tracking network of hidden malicious RFID reader in public places, and the threat to location privacy of RFID tags carriers. Theoretical analysis and comparison show that the proposed protocol can effectively resist the malicious tracking; even in the case of physical crack of the tag, the proposed protocol still well protected the previous privacy location and route information of the cracked RFID tag in public places; compared with other hash-based RFID authentication protocols, the proposed protocol has a stronger anti-tracking safety performance.On the other hand, the calculation of RFID tags in the proposed protocol requires only two hash function operations and a random number generator operation. The proposed protocol has achieved the optimal balance of calculation cost and system security, compared with other hash-based RFID authentication protocols.(2) A two-party ownership transfer protocol for RFID tags is proposed We also aim to safely transfer RFID tag's Ownership from retail companies to consumers, in order to protect the privacy of consumer.Since RFID tags can be attached to clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised privacy concerns. To address this problem, we do further study of the RFID tag ownership transfer protocol and propose a two-party privacy-preserving ownership transfer protocol for RFID tags in this paper, on the basis of previous research work.In the proposed protocol, the calculation of RFID reader in the proposed protocol requires only4times Hash computing and the back-end server need not to do any hash computation, which is superior to others.At the same time, the proposed protocol can protect the new tag owner's privacy as well as the old tag owner's privacy. Therefore, the proposed protocol achieve our aim to safely transfer RFID tag's Ownership from retail companies to consumers, protecting consumer privacy.
Keywords/Search Tags:authentication, Hash, ownership transfer, privacy, RFID, security
PDF Full Text Request
Related items