Font Size: a A A

Investigation On Lightweight Authentication Protocol For Rfid And Its Application

Posted on:2014-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:X F YuFull Text:PDF
GTID:2248330398974031Subject:Information security
Abstract/Summary:PDF Full Text Request
As one of the key technologies of the Internet of Things, compared with other automatic identification technologies, Radio Frequency Identification (RFID) technology has many advantages for examples rapid target identification, long reading distance, non-contact read etc. So it can be well used in all kinds of applications, such as production, retail, logistics, supply chain management, and traffic and so on. Currently its security and privacy have attracted much attention and have become an important factor which restricts the application and development of RFID. Due to strictly limited calculation resources, small storage capacity and faint power supply of low-cost tags, it is difficult to apply an ordinary and complicated but secure cryptographic algorithm to a RFID system. Therefore it is a great challenge to design an efficient, low-cost and secure lightweight authentication protocol for RFID system.Firstly, this thesis introduces the security threats and security requirements for RFID, and then analyzes several common authentication protocols and points out the flaws in these protocols.Then, we mainly focuse on the analysis of advantages and defects of the one-way function SQUASH based on Rabin cryptosystem proposed by Shamir. We then present SQUASH++in this thesis by applying the method of clearing the particular bits to optimize and simplify the computation complexity. Compared to the original scheme, SQUASH++not only guarantees very good security needs and keeps the performance of hashing functions, but also reduces the number of registers to1/2and the computation to8/1000.Based on these works and combined with the security requirements, we propose a two-way authentication protocol for RFID by means of SQUASH++, named TAPRS, which can provide confidentiality, data integrity and mutual authentication between readers and tags, and meet the security and privacy demands. With respect to the security, computation and storage capacity, TAPRS is better than others. To prove the security, this thesis uses the BAN logical to prove the improved protocol.Lastly, we optimize the model of RFID-based supply chain management by introducing the batch indentification of products and analyze the special security requirements for supply chain management such as the authoritative access, unlinkability, and visibility and so on. Then we point out the defects of the protocol by Cai et al. which was specifically designed for supply chains application proposed. So an improved version based on the batch supply chain system and TAPRS is proposed, named BSCSS. Through analysis and comparison of the security and efficiency, the proposed protocol satisfies most of the requirements of supply chain management and offers multi-batch operation of products. Compared to the original scheme, the overall performance and security of supply chain systems are improved.
Keywords/Search Tags:RFID, Lightweight Authentication Protocol, One-way function, BAN logical, Supply Chain Management
PDF Full Text Request
Related items