Font Size: a A A

Research And Design Of RFID System Security Authentication Protocol

Posted on:2013-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:W LiFull Text:PDF
GTID:2248330395490407Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
RFID security and privacy issues attract more and more attention as the RFID technology progressing. Now RFID security mechanisms include two categories:one is the physical security mechanisms; the other is security protocol. The physical security mechanisms use extra additional physical device or a dedicated reader to solve security problems, but there are always defects in these mechanisms, so physical security mechanisms are not suitable for large-scale extension. The security protocols are based on Cryptography, which is the hot topic of RFID security research.In this paper, I study the basic principles of RFID system, and the existing RFID security authentication protocols, proposed improvements and innovations for existing gaps, the main work is as follows:1. Introduced RFID system’s composition and the working principle and the existing international standards; and the details of RFID security issues and the existing security mechanisms, introduced the threat model for RFID systems and common means of attack.2. Introduced the existing RFID security authentication protocols,compared protocol based on symmetric key system, protocol based on the hash function and protocol based on public key cryptosystem, given the three types of security protocols security analysis.Proposed LPO protocol:A RFID Authentication Protocol for Low-cost Tags without back-endDatabase. LPO uses a tiny encryption algorithm, since the agreement case on the label side storage cipher text to verify the method of random number of two-way authentication. LPO costs low but can resist various attacks.3. Introduced the existing RFID security protocol:LCAP, details LCAP principle, its advantages and shortcomings for the the LCAP lack of agreement, the LP-1agreement of the new and improved agreement. The LP-1protocol improves the security strength of the entire agreement by increase its cost.4. Studied the latest smart RFID tags, a detailed description of smart RFID tags and design of the HP-0protocol for smart RFID tags, according to the capacity of smart RFID tags. HP-0protocol uses higher security strength of elliptic curve cryptographic algorithms, the protocol uses a group of global public and private key pair, the other on each label assigned to a different private key, data transmissions are encrypted by the ECC algorithm, and a great guarantee strength of the system security.
Keywords/Search Tags:RFID, authentication protocol, low-cost tags, LPO, LP-1, HP-0
PDF Full Text Request
Related items