Font Size: a A A

Research On Authentication Protocols For RFID

Posted on:2013-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:K J ZhuFull Text:PDF
GTID:2218330374967140Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
RFID is a technology for automated identification of objects, it will be used in many fields in the future, such as shopping, product tracking, warehouse management and logistics. But nowadays, some privacy and security problems still hinder the development of it.In this thesis, security issues like spoofing, counterfeiting, replaying, DOS and tag data manipulating in RFID systems are introduced. Considering these issues, we propose a formal definition of security requirements like privacy preservation, anti-tracking and authentication between tag and reader.In the following we also analyze some recent work in RFID security fields. In hardware aspect,"tag kill" and "tag block" are very useful, and in software aspect, many security protocols are put forward. Especially for the CKKp protocol, we deeply analyze it and find some security breaches of this protocol. Against the protocol, we put forward four attacks. They aim at the permutation of the protocol, try to calculate the real permutation and the secret keys, and then, succeed in attacking. Besides, we describe the effects of the attacks when we put the CKKp protocol into practice.Finally, we give a brief summary and point out a direction for the further research.
Keywords/Search Tags:RFID privacy and security, authentication, CKK protocol
PDF Full Text Request
Related items