Font Size: a A A

Design And Analysis Of RFID Security Authentication Protocols

Posted on:2015-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:G Y DengFull Text:PDF
GTID:2298330467463345Subject:Information security
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification (RFID) is an automatic identification technology which use wireless signal to identify objects. Compared with other identification technology, RFID has great advantages, so it has been widely used. However, since readers and tags communicate in a wireless and insecure channel and the traditional cryptographic algorithms cannot implemented in tags because of its limited computing power and resource, the RFID systems are facing serious security threats. The security problems of RFID system are becoming an important factor to limit its development. Therefore, there is a pressing need for a secure and effective RFID authentication protocol.After introducing RFID systems, the thesis analyzes all kind of security problem that RFID systems faced, summarizes its security requirements. The paper also introduces some RFID authentication protocols proposed recently. After that the thesis presents two RFID authentication protocols to solve the RFID security problems. The main work of the thesis is listed as follows.(l)Full understanding the relevant information about RFID systems, such as its components and working frequency. After introducing some kinds of common attacks to RFID systems, the thesis presents several security requirements when solving the RFID security problems. Then, two kinds of RFID authentication protocols are analyzed. One is the lightweight RFID authentication protocols based on LPN problem. The other is distance bounding protocol. After describing these protocols in detail, the thesis analyzes them and summarizes their advantages and disadvantages.(2) Proposing an LPN-Based lightweight mutual authentication RFID protocol:Tree-LSHB+. The protocol provides mutual authentication to protect the tags’ privacy. Also, the authentication keys stored in the reader and the tag are also updated when the mutual authentication succeeds. In order to improve the performance, the property of Toeplitz matrix is adopted in the protocol, which can reduce the communication overhead.(3) Proposing a Lightweight distance bounding protocols for RFID: LDBP. The thesis first introduces a new kind of classification for distance bounding protocols, depending on whether they distribute different secrets to the tags. Then according to the classification, two new versions of lightweight distance bounding protocol, LDBPv1and LDBPv2, are proposed in this thesis. The protocols only perform logical operations like ANDs, ORs and XORs, so they are very suitable to the low-cost tags. The difference between the two ones is that tags in LDBPv2possess the different secrets while in LDBPv1don’t. We prove that the mafia fraud success probability in the protocols is optimal(1/2)n and the protocols are resistant to terrorist fraud. In addition, the mutual authentication is achieved in the protocols with HB+protocol based on LPN problem. Privacy is also preserved in LBDPv2.
Keywords/Search Tags:RFID, Security, Authentication, LPN, LightweightDistance bounding protocol
PDF Full Text Request
Related items