Font Size: a A A

Research On Security Protocols For RFID Systems

Posted on:2016-07-12Degree:MasterType:Thesis
Country:ChinaCandidate:M LeiFull Text:PDF
GTID:2298330467992009Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The primal purpose of radio frequency identification (RFID) technology is to realize automatic identification of objects. In order to promote this technology for large-scale deployment, there comes the constraint of tags’ cost, which makes their storage and computing resources insufficient to support traditional cryptography primitives. Therefore, it is necessary to research security protocols suit for the application of RFID systems.In this paper, we summarize the security assumptions and common attacks of traditional RFID systems; divide RFID authentication protocols into four classes according to different encryption algorithms the tags support:the heavyweight, middleweight, lightweight and ultra-lightweight. This paper is mainly on non-heavyweight RFID protocols, concretely including:1. Research on the ultra-lightweight UMAP authentication protocols, the HB protocols in terms of lightweight protocols and the DB protocols in terms of middleweight protocols. It is the theoretical basis of subsequent two works. An UMAP protocol is simple in operation, but the defect is its security cannot be attributed to a mathematical problem and so weak in security; HB protocols are designed based on the LPN problem, an NP hard problem, but most of them are not against active attack; And the DB protocols are to prevent Mafia attacks and Terrorist attacks, how to reduce the probability of whose success are being studied by current scholars.2. Launch two kinds of active attacks on a new HB protocol. The first one can break out all keys in the mutual authentication stage of an improvement version of the Tree-LSHB+protocol, and can be applied to many other HB protocols designed on the LPN problem; the second attack based on random LPN instances problem even can reveal all keys in the tree-traversal stage of the protocol. It will be tenable and available to all HB protocols when the random problem is solved.3. Research on the security mechanism of RFID systems in cloud environment. We propose a security scheme of a cloud-based RFID system, and design a distance bounding protocol as an example, which is compatible with the mature EPC C1G2standard and can reduce the success probability of a Mafia attack to (3/8)n, lower than the optimal situation (1/2)n in academic circles.
Keywords/Search Tags:RFID, authentication protocols, LPN, HB, distancebounding, cloud computing
PDF Full Text Request
Related items