Font Size: a A A

Research On The Key Issues Of RFID Security Authentication Protocols

Posted on:2017-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:D HanFull Text:PDF
GTID:2308330482482433Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The concept of RFID(Radio Frequency Identification, RFID) is presented firstly by the Auto ID center of Massachusetts Institute of Technology in the United States in 1999. As one of the core technologies of the perception layer in Internet of Things, with the rise of "Internet +" industry, RFID has developed rapidly. RFID system is used in a wider range of areas, such as financial systems, technology and military systems, and engineering construction systems, etc.The communication of RFID system includes two parts: the communication between the reader and the background database using wire transmission is safe and strong; the communication between the reader and the tag using wireless transmission is vulnerable and relatively weak. The label is divided into two categories: passive tags and active tags. Currently, the security protocols used in active label applications are highly complex, and the hardware consumption is too heavy. The security protocols used in passive tags applications often have low security strength, and the operating efficiency is lower. So the security authentication protocols are the important guarantee to ensure the communication security of RFID system.Aimed at the security issues of active tag RFID system, the PRSA security authentication protocol is proposed, which is verified by the BAN logic and the SPIN model. The PRSA protocol is compared with the Hash protocol, the LMAP protocol, security protocols based on the ECC algorithm from the aspects of operation time, process step number, hardware cost, safety strength and operation efficiency. The experiments show that the PRSA protocol has lower complexity and smaller hardware consumption. For the security problems of the applications of passive RFID system, MH security authentication protocol is proposed, which is verified by the BAN logic and the SPIN model. The MH protocol is compared with SASI protocol, Gossamer protocol, RAPP protocol, LMAP+ protocol from the aspects of operation time, process step number, hardware cost, safety strength and operation efficiency. The experiments show that the MH protocol has stronger security and higher operating efficiency.In the dissertation, we analyze the security problems in the communication of RFID system. The most vulnerable part of the RFID system is the wireless communication between the tag and the reader. Two solutions for different types of tags are adopted, i.e. the PRSA protocol and MH protocol. Through the verification and comparison analysis, it proves that the security authentication protocol proposed can solve the communication security problems faced by the RFID system.
Keywords/Search Tags:Networking, RFID, PRSA protocol, MH protocol, BAN logic, SPIN model
PDF Full Text Request
Related items