Font Size: a A A

Research And Implementation On Public-Key Based RFID Authentication Technology

Posted on:2013-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ChenFull Text:PDF
GTID:2248330395456943Subject:Information security
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) as one of the non-contact automaticidentification technology, is widely used in practice, which brings many securityproblems to be concerned, where the security problems include tracking attacks,wiretapping attacks, illegal access attacks, the deductive and tamper of data, ReplayAttacks, physical attacks and so on. The large scale IP based RFID networkapplications will be developed in the future, which needs flexible and effective keymanagement and authentication technology. But the existing public key cryptographyalgorithms can not be directly used in RFID authentications for their highenergy-consuming and complex calculation. The traditional symmetric key-basedauthentication technologies are not able to meet the requirement of large scale RFIDapplications. So in this paper some feasible public-key based RFID authenticationtechnology are researched to deal with the problems that RFID tags are limited inresource, energy consumption and calculation capacity and meet the requirement oflarge-scale RFID network authentication. Our work is as follows:A simply certificate management scheme is given based on the mixture of Rabindigital signature and ECDSA, in which only a few multiplication and hash operationsare required that is suitable for low-cost RFID tag.A commission-computing based RFID authentication protocol is proposed, inwhich the complex calculations are commissioned to the reader. And the security of thesignatures is preserved by frequently updating the mask factor.A pre-computing based RFID authentication protocol is proposed by balancingthe storage space and computing power. So it is very feasible and does not compromisethe security.The above protocol mainly force on multiplication. In order to test theeffectiveness of the design, A commission-computing based RFID authenticationprotocol including some modules is implemented and verified by a hardware system,then the area report and power report are gotten. Finally the point multiplication isimproved, and the feasibility of realizing the point multiplication directly on RFID tagis analyzed.
Keywords/Search Tags:RFID authentication, Public-Key cryptography, Point Multiplication, digital signature, information security
PDF Full Text Request
Related items