Font Size: a A A

Research And Design Of RFID Authentication Protocol

Posted on:2016-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:J J ZhangFull Text:PDF
GTID:2308330464954816Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) is a kind of non-contact radio frequency automatic identification technology. It has many characteristics, such as far enough identification distance, strong adaptability to environment, rewriting the data in real time and etc.. At present, RFID has been used in many fields. In the RFID system, the cost of tags limits their physical properties, in turn restricts the realization of the system security. Therefore, it becomes an important problem faced in the application of RFID that how to solve authorized access and privacy protection under the environment of low cost.This paper researches and analyzes the existing RFID authentication protocol, and discussed the advantages and disadvantages of the existing typical RFID authentication protocols in realizing system safety. On the basis, we improve a typical distributed RFID challenge-response authentication protocol, and propose an improved efficient 3-Way RFID Authentication Protocol(3WRAP). The protocol makes full use of computing resources of the backend server for the “background” RFID tags, and introduces implicit authentication mechanism to reduce the number of protocol messages. Then, the efficiency of the protocol is promoted. Through the formalized security proof and comparative analysis, it shows that the protocol not only attains the RFID authentication integrality, but also has the characteristics of safety, high efficiency and low cost.This paper researches and analyzes a typical RFID authentication protocol and its improved protocols. Aiming at the defects of these protocols, we propose a RFID Multi-tag Authentication Protocol(RMAP) based on PUF. This protocol introduces "3-way" challenge-response authentication mechanism, and uses the physical properties of PUF to generate a pair of old and new fingerprints for the tags in advance. Then the safety authentication and privacy protection are realized. Through the formalized security proof and comparative analysis, it shows that the protocol not only realizes safety authentication, but also solves the authentication defects and security holes existing protocols.With the enlargement of the RFID application range, the problem of security and privacy protection is paid more and more attention by the people. Therefore, the research that this paper does has important significance.
Keywords/Search Tags:RFID, security, “background” tags, recessive anthentication, PUF
PDF Full Text Request
Related items