Font Size: a A A

Analysis And Research On Lightweight Authentication Protocol Based On PUF

Posted on:2016-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2308330461951475Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of things application and development in the network, security problem get more and more attention. Due to the openness of the Internet, compared with wired networks, relying on the wireless communication in ubiquitous network gets more vulnerable to security threats. And float in the network is an important part of RFID, wireless sensor nodes and smart card, with the method of wireless communication, facing to monitor threats, such as "cheating" tampering and track communications security and user privacy issues, it has become one of the key issues in the development of RFID technology.In network security, all kinds of security services are based on the security agreement, it makes the security of the security protocol beparticularly important. However, due to the power, battery capacity and the limitation of storage space, RFID and wireless sensor node, make design difficult to implement security mechanism. In view of the authentication protocol based on traditional encryption methods need a large amount of calculation, in the limited resources of equipment is not operable, lightweight authentication technology gradually become the research hot spot.The main contents of this paperare as follows:Firstly, The analysis model of PUF, and HB agreement on the basis of the RFID system, aiming at Hammouri series of authentication protocol proposed by combination of HB, PUF, GRS attack model based on Gilbert proposed corresponding man-in-the-middle attack method is designed. Through the analysis found that PUF HB agreement does not have the ability to resist the middle attack.Secondly, On PUF-HB agreement loophole, PUF was designed by using the method of using nonlinear functions PUF-NLHB protocol, and gives the specific hardware implementation structure. Under the random oracle model by statute to LPN issues strictly proved that the security of the new agreement, analysis shows that the new protocol provides low power consumption, tamper-proof, to prove that the security of authentication.Thridly, Based on the analysis of HB# protocol and the OOV-MIM attack, for the defects of HB# protocol, P-HB# protocol design based on physical unclonable functions, and gives the specific hardware structure. The new protocol by introducing a lightweight N-N PUF, provides higher safety consumption in low resource situations.Fourthly, P-HB# agreement under the DET model by statute to LPN issues strictly prove the security of the agreement, in GRS-MIM and OOV-MIM model analysis shows that the New Deal have to resist the ability of the corresponding man-in-the-middle attack, provides a low power consumption, tamper-proof, to prove that the safety certification.
Keywords/Search Tags:PUF, HB protocol, Man-In-Middle attack, Security proof
PDF Full Text Request
Related items