Font Size: a A A

Research And Implementation Of An Efficient And Secure RFID Batch Authentication Protocol

Posted on:2017-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:2308330503958941Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of economy, the radio frequency identification technology(RFID) which is a new, non-contact identification technology has gradually received extensive attention from the industry and academia. Nowadays, the main application areas of RFID include the logistics management, security detection, transportation, military field, daily life and so on. Then, how to achieve secure and efficient RFID tag authentication is more and more concerned. The RFID authentication protocol arises at the historic moment.At present, there are a lot of the related researches of RFID authentication protocol. They could be classified into two kinds, the per-tag-based authentication protocol and the batch-mode authentication protocol. In contrast, the batch-mode authentication protocol is more efficient and more suitable for complex scenarios. In the design process of RFID authentication protocols, it is necessary to give full consideration to the safety and privacy requirements of the protocols, such as tag information privacy, the forward security, resistance against replay, tracking and Dos attacks, etc. Meanwhile, we also should pay attention to the low-cost features of the RFID tags, which include the limited computing capacity, the limited storage capacity and the limited communication ability.In this dissertation, we introduce the RFID technology and the current research status of RFID authentication protocol in detail. Then, we summarize the threat model for RFID system, the security and privacy and performance requirements of the RFID system. After that, a safe and efficient batch-mode RFID authentication protocol is proposed. In the scheme, tags are grouped. And the tags in one group share the same group key. The connection between the group key and the tag’s own key is fully utilized to construct our batch authentication protocol. At the same time, the protocol in our paper takes the advantage of the aggregate hash function to reduce the communication cost between the reader and the server. The scheme achieves high efficiency. In addition, based on the proposed batch authentication protocol, we also put forward a group tags ownership transfer protocol which also supports the tag authorization recovery.The security and privacy of the RFID batch authentication protocol is analyzed in theory in this paper. Meanwhile, the BAN logic is used to prove the security of the protocol. The results show that the protocol meets most security and privacy requirements of the RFID system. In terms of the performance, in this paper, we carry on the theoretical analysis and implement the simulation experiment. Both of them indicate that the performance of our scheme is much efficient than other existing authentication schemes.
Keywords/Search Tags:RFID authentication protocol, Batch authentication, Security, Privacy, Ownership transfer
PDF Full Text Request
Related items