Font Size: a A A

Research Of Mutual Authentication Protocol For RFID Based On Hash Function And Public Key

Posted on:2013-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:H Q LiangFull Text:PDF
GTID:2248330374476034Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
RFID technology is a non-contact automatic identification technology, the perception ofcontact of the Internet of Things, and the core technology of the realization of perception inthe Internet of Things. However, the initial application design of the RFID system iscompletely open, the majority of RFID systems did not take into account security issues in thedevelopment process. With the capabilities of RFID systems and the growing popularity oftag applications, security issues, in particular, user privacy issues become increasingly serious.It has become an important factor to hinder the further development of the Internet of Thingsbased on RFID technology. Therefore, the research of RFID technology is related to thesuccess or failure of the Internet of Things. A normal RFID system generally should have thebasic features of the confidentiality, integrity, authenticity, availability and privacy. In thispaper, we mainly do the following work:(1)The present research situation of RFID technology in the Internet of Things isintroduced. In particular, the features of Hash-Lock protocol, Radomized Hash-Lock protocol,Hash-Chain protocol, ID change protocol based on the Hash function, LCAP protocol,distributed RFID inquiry-response protocol, digital libraries RFID protocol and so on whichare based on modern cryptographic techniques. At the same time, performance anddeficiencies of those security protocols are deeply summarized and analyzed.(2)Two RFID authentication protocols which have the basic features of theconfidentiality, integrity, authenticity, availability and privacy are designed. First, Based onHash-Chain technology, one kind of RFID mutual authentication protocol—Hash-Chainmutual authentication protocol is proposed. Through the introduction of the use ofproofreading key, it solves the data non-synchronization issues result from the communicationbetween back-and database and tag are interfered well. Then based on Hash function and ECCanother kind of RFID mutual authentication protocol—Hash-ECC hybrid authenticationprotocol to a good solution to the communication disruption of back-end database and the tagdata is not synchronized. Proposed an RFID mutual authentication protocol based on Hashfunction and ECC-Hash-ECC hybrid authentication protocol is proposed. Through embeddingECC public-key cryptosystem into the RFID system, it can achieve the exchange of shared key between the back-end database and tag to reduce the number of Hash computation whichis done by the back-end database. As a result, it can improve the efficiency of the RFIDsystem and meet the needs in the use of large-scale databases after it solves the datanon-synchronization issues.(3)The security of Hash-Chain mutual authentication protocol and Hash-ECC hybridauthentication protocol is discussed and analyzed from the user’s privacy, location tracking,data tampering, impersonation attacks, replay attacks, DOS attacks, mutual authentication,database synchronization, the former security, and the forward security. Meanwhile, comparedRFID authentication protocols designed in this paper with the previous protocols, the analysisof the efficiency and cost is done deeply.
Keywords/Search Tags:RFID technology, Hash function, ECC public-key cryptosystem, Proofreadingkey, Hash-Chain technology, Two-way authentication protocol
PDF Full Text Request
Related items