Font Size: a A A

The Research On The Security Of The RFID Mutal Authentication Protocol Base On EPC C1G2

Posted on:2012-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:J F RongFull Text:PDF
GTID:2248330395485030Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is non-contact automatic identificationtechnology which automatically recognised target and accessed to relevant datathrough radio frequency signal. RFID has been widely applied to industrialproduction and people’s daily lives, with the emergence of the second-generationElectronic Product Code, it will become one of the most widely used devices in thefuture, and now with the limited of the tag resources, the security of EPC C1G2(Electronic Product Code Class1Generation2) tags is not high, that seriouslyhampered the development of RFID technology. Thus the security problems of RFIDare more widespread concerned.This article describes the RFID system componets and working principle,expounes EPC standard, analysis the security requiremets and the security threats ofRFID system. Through analysising several typical EPC C1G2security authenticationprotocols, we proposed a high security, low cost, high speed authenticationprotocol-SAPCC1G2. The certification process of SAPCC1G2is identical with theEPC C1G2, and has a good compatibility, the protocol can adjust the threshold toaccording to different security need to achieve a compromise between safety andefficiency, has a good usability, the agreement also able to resist tracking attack,eavesdropping attack, labeling camouflage attack, replay attack, and DOS attack, thesecurity of SAPCC1G2was better than some typical security authentication protocol.Simulation the speed of the search of the label, the results showed that searchefficiency of SAPCC1G2was significantly higher than the protocol of HuangMin-sun’s gen2+.Meanwhile, the security analysis of authentication protocol is a puzzle of RFIDsecurity, through formal analysis method analyzing security of authentication protocolof RFID has been a hot research field. In this paper we through symbolic modelchecking method of the formal analysis checked whether SAPCC1G2protocol has theproperties of authentication, integrity, confidentiality, the results show that theSAPCC1G2agreement with these properties. Thus, in low-cost tags widely used today,propsing SAPCC1G2protocol has some significance.
Keywords/Search Tags:RFID, EPC C1G2, Security authentication, Model checking
PDF Full Text Request
Related items