Font Size: a A A

A Provable Security Communication Protocol In RFID System

Posted on:2013-06-13Degree:MasterType:Thesis
Country:ChinaCandidate:H D GaoFull Text:PDF
GTID:2248330371491490Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
RFID technology is considered as one of the key technologies in the Internet of Things,is the automatic identification technology which uses radio frequency (RF) signal to uniquely identify the object attached to a RF tag. Generally speaking, RFID system consists of EPC tags, readers, and a database of back-end server, readers connect the back-end server via the wired communication technology, readers connect EPC tags via the wireless communication technology of electromagnetic induction.Because the wireless is open, the data are vulnerable to the external attacks of tracking, and retransmission in the transmission process; on the other hand, the cost limitations of designing EPC tags make the system vulnerable to tampering, forgery and other internal attacks. It is undoubtedly a huge threat to the information security, Therefore, solving the privacy and security issues in RFID systems is a necessary condition for achieving the security in Internet of Things.Security methods which solve the security of RFID system mainly contain physical methods and password methods. Because physical methods have limited range, password mechanisms are the focus of today’s researches.Password methods use a variety of mature cryptographic algorithms and logical operations to design security protocols. The provable security theory is an important research direction in the research field of the security protocols in recent years, that is to say that the security protocol is reduced to solve some mathematical difficult problem. However, using the provable security theory to prove the security of RFID security authentication protocol is still relatively small.In this paper, in allusion to the idea of using the provable security theory to analyze the security of RFID security protocol, we propose a provable security communication protocol PSCP basing on the password mechanisms, the implementation process of the protocol is divided into authentication phase, the key update phase and the ownership transfer phase, we use the random oracle model of provable security theories to analyze and prove the security of PSCP. Analysis showed that PSCP can not only solve the forgery attack, replay attack, attack tracking RFID security issues, but also can solve the internal attacks,the ownership transfer of tags,other issues facing the Internet of Things of RFID systems. Finally, the comparisons of the simulation experiments prove that the protocol has a good performance.
Keywords/Search Tags:Internet of Things, RFID, EPC, PSCP, random oracle model
PDF Full Text Request
Related items