Font Size: a A A

The Research On RFID Mutual Authentication Protocol Based On Hash-Chain

Posted on:2013-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhouFull Text:PDF
GTID:2248330371495775Subject:Information security
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) is an non-contact automatic communication technology using radio frequency communication to achieve the goal of automatic identification of target objects and get the relevant data. It has many benefits which barcode technology do not has, such as high precision, strong adaptability, strong anti-jamming ability to adapt, fast action, non-visual recognition. Therefore, RFID system has been applied to retail, logistics, warehousing, manufacturing, automatic toll collection, animal identification, library management, and military fields increasingly.With the widespread application of the RFID technology, the security and privacy issues have become prominent increasingly. For example, the information of the tag is accessed without being authorized, and results in the loss of user’s privacy; the data in the tags can be malicious clone. Even as long as replay attacks and other methods can easily be disguised as a legitimate tag. These urgent issues have become the research hotspots for the domestic and foreign scholars. The security mechanism of the current RFID system mainly includes physical security mechanisms and authentication security mechanisms in two categories. Because of the physical security mechanisms being limited by cost and legal, causes the authentication security mechanisms, especially the authentication mechanisms which based on Hash function becomes more and more popular. The main research content is to design and implement authentication protocols to meet the security requirements of RFID systems with the help of the one-way Hash functions. To design safe, efficient, low cost RFID protocols based on Hash function has become a new challenging subject.The basic working principle of RFID systems was introduced firstly, then the security risk was in-depth analyzed, and the security requirement was summarized in this paper. Secondly, the existing authentication mechanisms were analyzed and compared in detail, moreover the deficiencies were pointed out. Then, aiming at the problem of existing authentication mechanisms, we put forward a kind of new RFID two-way authentication protocol based on Hash-chain which realized the mutual authentication between the tag and the reader, and used the BAN logic to formal analysis to prove its security. Finally, the certification process was emulated in the MyEclipse6.0+JDK1.7environment, and the reliability and practicability of the protocol was verified after various simulation.
Keywords/Search Tags:RFID, Hash-chain, BAN logic, Security protocol
PDF Full Text Request
Related items