Font Size: a A A

Research Of Rfid Security Protocols

Posted on:2013-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:B LiFull Text:PDF
GTID:2248330395450793Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of RFID technology, RFID system applications become increasingly wide. However, due to some inherent characteristics of RFID systems, such as constraints of resource and cost, open transmission channel, making the RFID system being vulnerable to various forms of attack, such as security, privacy issues. Therefore, considering about the development of RFID system and application, they must meet certain safety requirements.In this thesis, we first formalized analysis and discuss about the security requirement for RFID system. Base on that, we’ve divided the topic into three aspects, Hash Based Protocol, Tag State Based Protocol and Key Encryption Based Protocol. Further, to the Tag State Based Protocol, we’ve proposed a RFID Secure Protocol Based on Key Value Renewal; to the Key Encryption Based Protocol, we’ve proposed a RFID Security Protocol Based on NTRU Public Key Cryptosystem.For the RFID Secure Protocol Based on Key Value Renewal, the new protocol can prevent RFID system from spoofing attack, replay attack, tracking as well as the problem of desynchornization and provide forward security. To the system performance, the protocol can reduce the hardware cost of tags, query time in backend database and the communication between each other. Consequently, the protocol effectively enhanced the security of RFID systems. Then, this thesis has established an idealized model for the protocol and given a theoretically prove to the protocol by using the BAN logic analysis. Also, we’ve used Visual Studio2005platform to simulate the protocol to further ensure its feasibility.For the RFID Security Protocol Based on NTRU Public Key Cryptosystem, the new protocol can provide various level of security protection from its different key intensity. And based on the security of NTRU system and universally composable secure model, this thesis has provided a systematic and formalized analysis to the protocol.
Keywords/Search Tags:RFID, secure protocol, Hash, Key value renewal, BAN logic, NTRU
PDF Full Text Request
Related items