Font Size: a A A

Research On RFID Identity Authentication Technology

Posted on:2015-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:J W ShenFull Text:PDF
GTID:2268330428497334Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
RFID (radio frequency identification) technology is one of the core technology of the Internet of things,along with the radio frequency identification applications development, RFID systems have been widely used in e-commerce,transportation,logistics,animal identification.Since RFID systems use wireless communication technology to deliver messages in an open environment, it is vulnerable to attack,and the identity authentication technology is an important means to ensure the security of RFID system,but the RFID system is limited by the terminal hardware equipment,and difficult to deploy authentication scheme of the existing,so it is important to find a safe and effective mechanisms for RFID systems,so that the RFID system can be widely used in social life.In this article,we discussion the identity authentication technology issues of RFID system,and the main research work includes:1. Review the research status of RFID system of the security issues,including RFID basic composition and woring principle,attack means, attack model security requirements of RFID system,and proposed a attacker model which is suitable for our paper.2. Analysis various security protocols which based on cipher technology,and discuss the security of these protocols.3. We proposed the ultra-lightweight authentication protocol which based on XOR operation,it saves a dynamic refresh identification number,and using this number to encrypte messages,thus solving the label sending message not time-efficient problem, balance the cost and safety.4. We proposed the strong authentication protocol which based on public key cryptography algorithm,and it uses ECC function to calculation the private key to achieve zero knowledge authentication with this key,and it solves the cloning and the retransmission problems in the security protocol.5. Analyzes the security of the two authentication protocols which proposed in the aboves,and analyzes their performance with simulate the two security protocols using the OPNET simulation software.The results show that, in the same network environment,the two protocols can achieve both security and performance requirements,they are effective authentication protocols.The innovation of the article includes:(1)According to known attack models and security objectives of security protocols,we proposed a attack model which suitables for RFID system,and it includs the attacker ability hypothesis and attack means hypothesis.(2)Propsed a low cost Ultra-lightweight RFID authentication protocol,and the tag-side only needs to achieve the XOR function in this protocol,and it is satisfied the lower cost demand of RFID tags.(3)Proposed a strong authentication protocol which can meet the high-strength secure demand of RFID systems,and it designes based on the discrete logarithm problem,so it is satisfy for RFID systems to have good intensity security needs.
Keywords/Search Tags:RFID, authentication protocols, Ultra-lightweight, ECC, OPNET
PDF Full Text Request
Related items