Font Size: a A A

Research On Transfer Authentication Protocols In RFID Systems

Posted on:2015-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y J MaoFull Text:PDF
GTID:2348330485994393Subject:Computer technology
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) is a non-contact automatic identification technology, passing messages through radio signals to achieve identification. In the practice, an RFID tag's owner can be different throughout its lifetime, and the ownership transfer can be divided into two types, which are general transfer and exclusive transfer. The security issues on tags' ownership transfer are attracting more and more people's attention. With the RFID tag's limited calculation speed, communication ability and the storage space, how to provide security protection mechanism for RFID tag ownership transfer is becoming concerned by researchers.In this paper, with the analysis of the security problems in RFID tag ownership transfer systems, we summarize the existed transfer protocols and the security problems. The research has been carried out from the perspectives of models, protocols and security proofs. Firstly, we define the matching conversation, propose three-party authentication security model and security goals in RFID tag ownership transfer based on the provable security theory. And then we design two games with adversaries participating, list several scenarios and put forward general transfer's and the exclusive transfer's security goals in games. Finally we put forward two RFID tag ownership transfer authentication protocols: OT1 and OT2. Based on the security assumption, it has been proved the general transfer security goals are met in OT1, and exclusive transfer security goals are met in OT2. The analysis shows that the proposed protocols have made an improvement on the security and efficiency compared to the existed transfer protocols.The RFID tag ownership transfer model proposed in this paper provides a basis for the security analysis of tag's ownership transfer. The two transfer authentication protocols can effectively achieve the ownership transfer safely on RFID tags. What's more, it can be targeted to solve problems in the production and practice.
Keywords/Search Tags:RFID system, ownership transfer, provable security theory, cryptographic protocol, identity authentication
PDF Full Text Request
Related items