Font Size: a A A

Research On Lightweight RFID Grouping Authentication Protocols

Posted on:2017-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:H W TanFull Text:PDF
GTID:2348330485498914Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the key technology of Internet of Things, RFID will be widely used in many areas in the future. RFID grouping authentication focuses on verifying multiple RFID tags simultaneously, which meets the requirements of real applications. The grouping authentication towards low-cost passive tags is one significant direction in RFID research field. However, some security and privacy problems remain to be solved due to the limitation of resource and computation. Hence it is necessary to design appropriate authentication protocols with the aim of offering enough secure assurances to both the RFID system and the users.This paper is focusing on RFID grouping authentication and apply hash chains to the ID updating process in the protocol. Based on LRMAP and LBRSP, an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection is proposed. The proposed protocol can offer enough resistance to de-synchronization attack. The identity of the tag will be updated in every session run. In addition, a novel hash-based RFID grouping authentication protocol on multiple readers and tag groups is proposed. After that, this protocol is extended to large object authentication. The detailed contents of this paper are as followed:First, a novel hash-based RFID grouping authentication protocol on multiple readers and tag groups is proposed. In our design, the RFID system is capable of conducting verification towards multiple tag groups according to real requirements. The security analysis shows that the proposed protocol is resistance to many kinds of attacks.Second, the above protocol is extended, and a new lightweight RFID grouping authentication protocol in multiple-tag arrangements is proposed. In our design, a number of tags are attached to different parts of the large-size object. The backend process system is able to take control of the entire authentication process. This protocol is proved to offer sufficient security assurances and has resistance to various attacks under the security analysis.Finally, an indoor RFID authentication system based on our research in RFID authentication area is implemented.
Keywords/Search Tags:RFID, Grouping Authentication, Security, Privacy
PDF Full Text Request
Related items