Font Size: a A A

Design And Analysis Of Two Kinds Of RFID Security Authentication Protocols

Posted on:2015-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:L R ZhangFull Text:PDF
GTID:2298330467480403Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
RFID is a non-contact identification technology for someone or something which contain with RFID tags. However, the exchange of information and data in the RFID technology is the wireless channel, whose hidden peril is unsafe and its privacy has become easy to leak. If the problem cannot be resolved, the use of RFID is more harmful than useful. Subject to constrained cost, the current safe tools cannot be embedded into the hardware tags of RFID. Therefore, Safe protocols with no increasing the operating costs of the system, which also can ensure privacy and security of the system become one of the hot issues in the field of RFID research. In this context, the paper is designed and completed.In line with ensuring privacy and security and improving search efficiency as well as reducing the cost of labeling, this article is designed by the ways of analyzing the situation, identifying problems and proposing solutions. According to the logic structure of the paper, two different security authentication protocols were presented. One safety authentication protocol based on an LPN problem is improved and lightweight level. Firstly, It gives us a full analysis of three typical protocols in the existing HB protocol family. Secondly,It has taken the security issues of the protocols as the breakthrough. Lastly,by analyzing and comparing the performance of several protocols in response to security attacks, the protocol comes into being which can enhance the security of the system and continue concise features of HB protocol family.Another authentication protocol based on label grouping is called anonymous authentication protocol. It is proposed base on the tree based on protocols.Firstly, the design of the protocol and the process of implementation have been discussed in details. Secondly,The safety of the protocol are also described and compared through examples and artificial experiment. Lastly,according to the analysis of results, the protocol has shown better performance on protection of security privacy and reducing the complexity of the system searches.
Keywords/Search Tags:RFID, Light Weight, Group of Tags, Anonymous, Authentication Protocols
PDF Full Text Request
Related items