Font Size: a A A

Research And Implementation Of Ultra-lightweight RFID Authentication Protocol

Posted on:2015-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:C WangFull Text:PDF
GTID:2298330422980989Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) systems have been successfully applied to identificationand logistics management. RFID systems are vulnerable to the threats of external attacks for thereason that RFID readers and tags communicate in a wireless channel. The challenge of security isemerging. Although low-cost RFID systems are used most extensively, the low storage capacity andthe poor computing power of tags have limited the implementation of security mechanism. A series ofultralightweight RFID authentication protocols that only involve simple bit-wise operations likeAND, OR, XOR and rotation, are paid more and more attention. The purpose of these protocols is tomeet security requirements like data confidentiality, integrity and reality under the premise of therequirements of low-cost RFID systems. This paper will focus on ultralightweight RFIDauthentication protocols. The main contributions of this paper are summarized as follows:(1) We propose a heuristic attack strategy based on simulated annealing algorithm to prove thatthere exist security flaws in RFID protocols designed by T-functions only. First of all, we introducethe definition of T-Functions and analyze its insecurity. Then we explain the main idea of the heuristicattack strategy and experiment on the improved LMAP+protocol. Combining the experiment resultswith the untraceability model proposed by Jules and Weis, we conduct traceability attack successfullywith a nearly100percentage. And the secret values of improved LMAP+are disclosed successfullyafter repeated experiments of the attack strategy with a70percent probability. The experiment resultsindicate that the protocol does not meet the security requirements of RFID systems. Compared withtraditional attack technologies, the heuristic attack strategy is more passive-aggressive, efficient andtime-saving.(2) For the potential security problems of existing ultralightweight RFID protocols, we propose anew ultralightweight RFID authentication protocol named RRBMAP to meet the securityrequirements of low-cost RFID systems. First, we summarize the flaws of existing typical protocols.Second, we put forward an operational method which involves reverse and rotation to hide secret data.Then, the secret keys of current thread and previous thread compose the data which is used to resistreplay attack. Finally, we analyze the security of RRBMAP protocol and implement it with simulatingactive attacks, the experiment results show that RRBMAP is resistant and feasible.
Keywords/Search Tags:RFID security, authentication protocol, ultralightweight, heuristic attack strategy
PDF Full Text Request
Related items