Font Size: a A A

Suitable For Wireless Connection Of RFID Security Authentication Protocol Based On Hash Function

Posted on:2016-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhengFull Text:PDF
GTID:2308330467497324Subject:Internet security
Abstract/Summary:PDF Full Text Request
The radio frequency identification (Radio Frequency Identification, referred toas RFID) technology is the key technology of the Internet of things will have broadapplication prospects, the economic value of the potential is inestimable. Soby RFID technique in recent years, more and more attention. But thistechnique because of many safety problems of its own characteristics of thesystem still attracted much attention. The security problem of RFID system hasbecome an important factor of restricting its development. Because the RFIDsystem is not suitable for the heavy weight cryptographic protocol, so the design is animportant research subject of low energy consumption and high security protocol.This paper firstly makes a brief description of the RFID system according to thepresent condition of RFID system security to make a summary description. Throughthe analysis of RFID system security according to the server in the label verificationprocess and label the shared secret whether the update will be RFID securityprotocol is divided into two categories: static and dynamic mechanism of the ID IDmechanism. Because there are two kinds of RFID reader and the connection to theserver, a connection to another take wireless connection to take physics. The physicalconnection is considered to be a secure channel, a wireless connection is considerednon-security channel. So the RFID security protocol is also divided into suitablefor the cable connection and is suitable for wireless connection two. Because thewireless connection way has good mobility,easy to use so the proposed are suitablefor wireless security protocol connection. This paper describes in detail the mayappear in the RFID system of the various types of attacks and analyzed,thenfrom these attacks summed up to avoid the system security mechanism underattack. Security protection mechanism of RFID system are divided into physical protection mechanism and password protection mechanism, thispaper researches the mechanism and application of password protection based onone-way hash function.In this paper, through the analysis of the previous work is summarized and putforward a RFID based security authentication protocol static ID mechanism. Bytargeting the tag tracking, analysis and comparison of refuse RFID authenticationprotocol service attacks common attack means with the same level of. Through theanalysis we believe that the protocol can resist common attack means theattacker RFID system. At the same time, the protocol is better than the same level ofagreement on energy consumption. After a comprehensive analysis, the protocolachieves a good balance of low cost and low energy consumption and system security.In this paper, through the description and analysis of the previouswork and problems in these proposed a RFID based security authentication protocolfor dynamic ID mechanism. For security threats RFID possible system areanalyzed. After analysis, the proposed protocol not only can well resist the loss ofsynchronization, also can resist common attacks such as tracking, eavesdropping. Atthe same time, the results show that the protocol in energy consumption, safety andperformance is better than that of a series of current protocol.This paper introduces the representative logical proof method of formalmethods in the logic--GNY; because the untraceability is an importantsafety requirements of the RFID agreement so this paper proposes GNY logic onthe untraceability of proof based on. According to the protocol proposed in thispaper for a formal treatment, is proposed and demonstrated to target, and through thebasic GNY logic formula is derived to prove results. The results show that thealgorithm proposed in the paper, is to meet the system requirements of the RFIDsecurity protocol.
Keywords/Search Tags:RFID, Security protocol, Static ID mechanism, Dynamic ID mechanism, GNYlogic
PDF Full Text Request
Related items