Font Size: a A A

Research And Design Of The RFID Authentication Protocol

Posted on:2015-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:W J ChenFull Text:PDF
GTID:2308330473450965Subject:Computer technology
Abstract/Summary:PDF Full Text Request
RFID technology, originated from 1990 s, is an automatic identification technology which can identify objects without touching each other and without human intervention; it has received the widespread attention from all walks of life in recent years since it was regarded as a new technology instead of the traditional bar code identification.As one of the main technical means in perception layer of The Internet of Things, RFID brings convenience to our life, but also poses a threat to the privacy of users, including illegal read data, the leakage of confidential information and threat to location privacy.There are two ways to implement the security mechanisms of RFID system, one is based on physical method and another method is based on the cryptosystem techniques. Since the physical methods are high cost, low safety, and may lead to legal problems, most scholars regard the study focused on the technical aspects of the cryptosystem, namely to design efficient and secure RFID authentication protocol to achieve secure communication between tag and database, protect information security and user privacy.Since the early RFID chip technology is not mature, public-key cryptography cannot be used in low-cost RFID system. However, the chip technology has been rapidly development in recent years, the low-cost tags also have a certain amount of computing power, public-key cryptography systems began to be used in RFID systems. Due to the low-cost and limited computing power of tag, we assume that the tag can only do basic cryptographic operations, such as generate a random number, Hash operations, addition and multiplication. In this thesis, we employ a method of pre-calculated, it means that part of the exponentiation is pre-computed by Issuer and stored on the tag during tag initialization and instead of performing the exponentiation, the tag only needs to compute a few multiplications using the pre-computed values in its memory. In this way, the tag just adds a little amount of storage, but it can use public-key cryptography to authentication and provides better security and privacy for system.Our contributions can be summarized as follows:This thesis analyzes the existing RFID security mechanisms; most security protocols store tag’s identity and secret value in their database. When there is a tag to be certified, the Reader should query the database to find a matching entry. The increase of the number of tags will reduce the authentication efficiency of the system. We based on public-key cryptography propose a new RFID authentication protocol, the tags in new protocol are anonymous and untraceable to outside attackers, which can protect user’s privacy effectively. Moreover, readers of new protocol do not need to query the database to find the secret key of the tag, which reduces the time complexity of the system. Followed, we propose a RFID batch verification protocol to improve the efficiency of authentication.This thesis analyzes the Armknech et al.’s RFID anonymous authentication protocol, and points out that the protocol does not achieve the claimed security objectives, the revoked tag will be able to track by Reader, "Anonymizer" knows the identity information of tags and poses a risk to the system, and that the protocol cannot resist against denial of service attacks. Thus, we give the specific attack schemes.This thesis analyzes the anonymous authentication mechanisms of sender. Then proposes a new group signature-based key update RFID anonymous authentication protocol, it has the properties of anonymity as well as un-traceability to outside attackers and readers. The new protocol does not need the participation of a third participator, and it solves the problem of traceability of revoked tags. Then we use the protocol to compare with the existing anonymous authentication protocols for safety performance, the results show that the new protocol provides more security.
Keywords/Search Tags:RFID, security protocol, anonymous authentication
PDF Full Text Request
Related items