Font Size: a A A

RFID Mutual Authentication Protocol Design And Security Analysis

Posted on:2015-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2308330464970443Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The development of science and technology had provided much convenience to people’s lives with work efficiency and economic benefits. The Internet was part of common life for communication and other connections. The implementation of the Internet of Things(IOT) allows objects with RFID tag link to the Internet, which further enhances the connection between matters and humans. With limited memory、low security levels、slow read/write speed、traditional identification technology(such as bar code) cannot meet the requirements of manufacturers, retailers for now. RFID technology avoids the defects of traditional identification technology and reduces the related cost as the development of the technology. But there are some security issues in RFID. With a limited number of logic gates, and even fewer for security, low-cost RFID tag have some security risks, such as tag tracking attack, the denial of service attack between tag and back-end server, message replay attack, forward and backward security, tag cloning, man in the middle attack and so on. Mutual authentication protocol for RFID system can solve some of the security problem.We study on the mutual authentication protocols of low-cost, high security and high efficient RFID. There is no unified attacker model and provable security methods of mutual authentication protocol for RFID system, which limited the analysis and the investigation of RFID technology. We analyze some protocols with security and efficiency and make improvement. This thesis contains three contents as follows.1.The application background and prospect of RFID technology is briefly introduced, then a description of the RFID composition, system structure, working principle and system standard and application field is made. The security assumptions, requirement and encryption functions are discussed.2.The security of RFID mutual authentication protocol proposed by Pang et al is analyzed with Dolev-Yao model, with CRC’s linearity, the protocol is vulnerable to non-synchronization attacks and track attack. A mutual RFID protocol with hierarchical tag indexing based on this protocol is proposed, according to Dolev-Yao model, it shows that the new protocol not only can resist all types of attacks mentioned in the thesis and can fast index target tag and improve system efficiency.3.By analyzing the security of distance-bounding RFID protocol proposed by Yang et al, we find that this protocol can’t resist forward security, backward security and tracking attack etc. Then an improved protocol is developed and the security analysis of the improved protocol is made.
Keywords/Search Tags:RFID, mutual authentication, lightweight, hierarchical index, distance-bounding
PDF Full Text Request
Related items