Font Size: a A A

Research Of Multi-tag Secure RFID Authentication Protocol

Posted on:2015-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:H S ZhangFull Text:PDF
GTID:2298330431980957Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) is a new automatic identification technology. As RFID does not need in-sight communication, it can guarantee low cost and highly efficient operations and capability of multiple tags identification at the same time. RFID has a lot of advantages over some other identification system, such as the bar code technology, smart card and biometric identification (fingerprints and retina identification).Recently, RFID technology has been in a rapid development by industry and academic coomunity. For instance, RFID has been widely used in supply chain management, electronic payment, access control, environmental monitoring, intelligent labels, port management, ETC no parking charging system, RFID-SIM mobile wallet by China mobile. RFID is also the basis for implemntation of the Internet of things. More products based on RFID will appear in the future.With the rapid growth, RFID also brings some security issues. The design idea of RFID is that system is completely open for applications. This is the root cause why RFID systems face serious security issues. In addition, encryption and decryption operation performed by a label consume more resources, and increase extra overhead for a cheap tag. So it makes some excellent security technologies can not be used directly by RFID tags. Cost of security omplementation is an important factor for designing secure RFID protocols. Therefore, secure RFID protocols should be light-weight.This dissertation studies RFID authtication protocols, and analyses some existing secure RFID protocols to find out some improvements.Then two new RFID authtication protocols are presented. The major part of this dissertation can be summarized as the following:1. A RFID protocol based on the symmetric cryptosystem:In order to design a light-weight RFID protocol, a secure RFID protocol based on the symmetric cryptosystem is presented. An authentication key can be updated after each successful authentication between a tag and reader such that ehchance security for future communication and prevent attackers from impersonating tags. Security analysis shows that the protocol meets the security requirements of RFID system. Finally, we make performance comparison with other protocols and evaluate the running time when authenticating tags by our protocol. It shows that our protocol is efficient.2. A multi-tag authentication RFID protocol:The previous secure protocols aim for authenticating tags one by one. In practice, one often need authenticate multiple tags. In this case, verifying validity of multiple tags at the same time can greatly reduce the computation and communication overhead during the authentication process.We put forward a multi-tag authentication RFID protocol in this dissertation. When authenticating multiple tags, a reader aggragate authentication information from all tags into one authenticator, then the authenticator is sent to the server, and verified it. Each tag is also to check the validity of the server. This method can substantially reduce the communication cost between the reader and server.Then we analyze security and performance of the protocol. Finally we implement this protocol by the Miracl library to evaluate its concrete perfprmance. The resultn shows that Multi-tag secure protocol outperforms authenticating tags one by one.
Keywords/Search Tags:RFID, Anthentication protocol, Information aggregation, Symmetric cryptosystem, Multi-tag
PDF Full Text Request
Related items