Font Size: a A A

Design And Analysis Of New RFID Security Protocols

Posted on:2015-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2298330431496182Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
IOT’s theory and application is the core of the third information revolution, it havebeen concerned. According to the experience of the development of the Internet, IOTis still in the stage of the LAN and VPNS age, but it will develop into an opennetwork platform in the future. RFID technology as the core of IOT’s technology, itssecurity protocol is important foundation of information security of IOT, so there aremany academic studies for RFID security protocol.However, due to the RFID application model is distributed system, most of RFIDsecurity protocols heve been used in independent distributed system, so theseprotocols have been unsatisfy the requirements of IOT new development.Theperception network of IOT continue to use traditional RFID security protocols can’tmake safety communication between IOT subnets. This problem is not only arestriction to the popularization and promotion of Internet of things,but also hinderedthe Internet and other new information technology of combine. How solve theserestrictions, it has been a important problem in the information technology revolution.In this paper, the author made the following work.First of all, According to the development of the Internet of Things, the paper putforward a new kind of RFID mutual authentication protocol. The protocol has thefollowing characteristics:(1) This is different from the traditional based on theencryption algorithm processing authentication information authentication protocol,the new protocol used of the authentication method of zero-knowledge proof tomember certification, and make the member authentication’s security is equal to itsown code of identity’s security.(2) The protocol applied in the IOT interconnection,so the protocol can satisfy a tag’s security authentication when it is applied tomultiple RFID system.(3) The protocol uses the dynamic security strategy. We can beadapted to the different security requirements by adjusting the security parameters. Sothe protocol can be adapted to complicated and changeful environment of IOT. Inaddition, the author used the Strand Space Model to prove the protocol at least meetthe authentication, secrecy and tag untraceability. Secondly, this paper have formal prove that the new RFID authentication protocolhave the security properties such as authentication, confidentiality and Taguntraceability, use proof methods of strand space model.Finally, this paper discusses the RFID tag ownership transfer protocol, and detaileddescription of the new RFID tag ownership transfer protocol and the protocol securityanalysis. The protocol can satisfy a tag is applied to the multiple RFID system.At the last, the author puts forward the concept about social level producttraceability and discusses the new RFID security protocols is feasibility of applied tothe social level product traceability. This paper proves that the new RFID securityprotocols are important to the Internet of things development.
Keywords/Search Tags:Internet of Things, Authentication Protocol, Zero-Knowledge Proof, RFID, tag ownership transfer protocol, Product tracing
PDF Full Text Request
Related items