Font Size: a A A

Research On EC-RAC Based RFID Authentication Protocols For The Application Under The Internet Of Things

Posted on:2014-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z H ChenFull Text:PDF
GTID:2308330503452712Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The Internet of things, one of the trends of science and technology in twenty-first Century, is developing rapidly. At the same time, how to keep the security and privacy for users has become an enormous challenge. Nowadays, there are two methods to complete the authentication and user privacy protection. One is RFID physical security solution; another is cryptographic protocol security solution. Physical security strategies have high cost and large limitation, but cryptography-based security protocols are more flexible which have become the most active directions right now. In this paper, we discuss cryptography-based security protocols and select elliptic curve cryptography as a core. By deep analysis and research on the original EC-RAC protocol, we put forward corresponding improvement for both security and application and obtain the following results:(1)Present a mirroring protocol optimization scheme which uses the Diffie-Hellman key exchange technology on the original system without making any changes to complete the mutual authentication. Combine the method with the private key randomization on EC-RAC protocol and propose the mutual authentication improvement protocol MI-EC-RAC and get a better security performance.(2)Based on the theory research of MI-EC-RAC and combining with low cost and limited label operation ability, propose a brand new mutual RFID authentication protocol – MHI-EC-RAC with the change of the improvement of authentication framework, introducing lightweight Hash function, optimization of data confidentiality. The protocol has excellent security performance and application performance which can be used in practical application.(3)For the personnel and secret carriers access management issues, design a new access control management system and method based on MHI-EC-RAC authentication protocol. And extend the protocol to the offline group authentication protocol OAMHI-EC-RAC protocol so as to meet the different situation management needs.
Keywords/Search Tags:RFID, Authentication Protocol, Elliptic Curves Cryptography(ECC), Access Control, Diffie-Hellman Key exchange, Hash Function
PDF Full Text Request
Related items