Font Size: a A A

Research On Secure Ownership Transfer Protocols Of Tag Based On Dynamic Overload In RFID

Posted on:2016-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:T B LiFull Text:PDF
GTID:2308330464954258Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) is a comprehensive science technology that based on computer and communication, it uses radio frequency signal carrying non-contact automatic identification on target objects with spatial coupling. Due to the characteristics such as flexibility and low cost of tags, RFID worldwide widely used in many fields, especially, in the supply-chain, manufacturing, public information services and other areas, costs were reduced and efficiency was improved in terms of management level.With the industrialization of RFID in the world, the following information security problems in massive applications especially in commercial areas planted risks, but also hindered the application and promotion of RFID technology. Security and privacy issues brought by tag information as an important factor in the development and application of RFID technology have drawn increasing attention.Based on the mechanism of RFID system and characteristics of low-cost tags which Storage capacity and computing ability are limited, this paper presents new RFID tag ownership transfer protocols. In communication process of protocol, lightweight operations were adopted, Tag anonym were transmitted in wireless channel which processed by Pseudo-random Encryption Function.Using shared-key recovery mechanism to excute authentication and authorization between tags and owners,which could ensures the robustness of the protocol.At the same time,the shared-key dynamically negotiated and updated by both communication sides.It improves the security of information data in the process of ownership transfer.The protocol analysis proved that the protocol can resist various attacks by low-complexity algorithms, and have lower traffic and higher computation efficiency.The focus of studies in this paper is the communication data security based on the wireless channel between electronic tags and readers, on the basis of that depth-analysis of security threats have to facing in data communication of wireless channel in RFID systems, proposed corresponding security policy to all attacks rivals might take. Made the following findings:1. Proposed lightweight anonymous mutual authentication ownership transfer protocol for low-cost RFID tags. Protocol carrys on session key negotiation on the basis of realization of bilateral authentication between the reader and the tag, it can resist replay, asynchronous and other attacks, and has forward and backward security, while preventing adversary tracking tags, protecting the privacy of tags. The data analysis show that compared with the similar protocols, the protocol protect information of tags with lightweight computation, it has advantages on the storage and computing performance.2. Considering attack strength from adversaries in some scenarios, proposed an ownership transfer protocol of tag based on dynamic overload. It added self-compiling extension factor for pseudo-random sequence generator on the basis of the PUF component; Constructing lightweight set of candidate functions for both communication sides, it achieves dynamic execution of algorithms in ownership transfer process which via the overload principle in Object-Oriented programming. Protocol provides communication process with dynamic overload of algorithms. Proving the security of protocol by means of formal analysis with BAN logic. With simulation experiment, the performance analysis show that the new protocol with a lower storage costs in exchange for a stronger security.
Keywords/Search Tags:RFID Tags, security and privacy, Authentication and Authorization, Ownership transfer, Dynamic overload
PDF Full Text Request
Related items