Font Size: a A A

The Research And Application Of Identifiable Security Authentication Protocol Based On ECC For RFID In The IoT

Posted on:2014-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ZhuFull Text:PDF
GTID:2268330401478984Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
As the concept of IoT (Internet of Things) is raised, RFID technology has a good development momentum. With the wide application of RFID, its particular non-contact character has brought about all sorts of safety problems, which compromise integrity, reliability of the data and user privacy and so on, on unsafe communication channel between the electronic label and the reader. To set up the RFID security authentication mechanism which can adapt to the RFID system of limited hardware sources is difficult. Because all sorts of defects exist in the physical security mechanism, people put more attention on the authentication protocols based on cryptography technique.This thesis analyses the existing RFID security authentication protocols which has different abilities of replying to the attacks comprehensively. Combined with them, a m-ore secure and high-efficiency Elliptic Curve Cryptosystem (ECC) system is introduced. The basic knowledge and encryption principle of ECC are stated detailly. In response to the existing attack algorithms, this thesis chooses the secure ECC parameters and gener-ates base point and elliptic curve equation defined over a finite field using related algorithm. A complete set of ECC system including the improved algorithm for embedding plaintext to a point of elliptic curve, an improved secret key consult mechanism and encryption-decryption basic algorithm is set up. This thesis proposed a new RFID security authentication protocol based on the above-mentioned ECC system. This new protocol is suited to the RFID system, which has finite computation ability and memorizer space, and can provide high security under small secret key quantity. Rigorous analysis reveals that it can cope with the ubiquitous security issue of the RFID system. Formalized analysis combined with the BAN logic proves the effectiveness of the protocol. Finally, the application of RFID technology and the new protocol in security management of dangerous material is narrated combined with3G technology and GPS positioning technique, and its broad application prospect in IoT is viewed.
Keywords/Search Tags:Internet of Things, RFID, Security authentication protocol, EllipticCurve Cryptosystem, Security management of dangerous material
PDF Full Text Request
Related items