Font Size: a A A

The Research And Design Of RFID Security Authentication Protocol

Posted on:2015-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:X G XuFull Text:PDF
GTID:2268330428497413Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is a radio signal automatic identification technology to identify specific targets. With the continuous development of science and technology, RFID technology is increasingly popular. Due to its resistance to wear and the tag has many advantages, long life cycle and high repeat usage, etc, have been widely used in many industries in the field of logistics and transport, intelligent transport, authentication, resource recycling.Although RFID technology has been widespread concern in the industry and the scientific community, but its security, scalability, and economic costs and other issues has been a bottleneck in the development of RFID technology. Especially in low-cost RFID system, the tag side storage capacity limited space, computing power and a power supply and so affect the ability to achieve RFID security mechanisms. Therefore, the design for low-cost RFID system security mechanisms have significance across time. In the RFID system security background conditions, thesis research and innovation, including:Firstly, the paper carried a RFID system knowledge elaborate three-dimensional, from basic concepts, working principle to RFID technology standards and specifications, safety models and solutions;Secondly, the paper summarizes a detailed summary of the research work with existing RFID authentication protocols, including the basic definition of security authentication protocols, nature, advantages and disadvantages of different classification and comparative analysis;Thirdly, for the presence of existing RFID authentication protocol security vulnerabilities and the high cost of privacy issues, this paper proposes a lightweight PUF-based RFID authentication protocol, the protocol implements the use of PUF with LFSR strong between the reader and the tag. In addition, the agreement increases the reader secondary authentication security mechanism, in order to ensure a shared key reader and tag synchronization bad attack adds M logo and other means to solve the existing authentication protocols exist in a variety of security vulnerabilities. By security, performance analysis, and show that the BAN logic formal proof authentication protocol is not only low cost, and can effectively resist physical attacks, DoS attacks, sabotage attacks and other attacks synchronization to meet the authentication protocol correctness, security, privacy;Finally, the existing security tag ownership transfer process, the paper also proposes a transfer of ownership N-O-T authentication protocol that ensures the transfer of ownership of the security tag, at a lower cost while ensuring the premise of the original owners of the former security and privacy to the new owners to privacy security, can effectively resist tampering forgery attacks, replay attacks, sabotage attacks asynchronous.
Keywords/Search Tags:RFID, Lightweight, PUF, Authentication protocol, Security, Ownershiptransfer
PDF Full Text Request
Related items