Font Size: a A A

Research On Multi-owner Tag Ownership Security Transfer Protocol

Posted on:2017-09-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q XuFull Text:PDF
GTID:2348330491458127Subject:Software engineering
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification) mainly through the radio signal to identify specific targets and reading and writing data, without the need for recognition system and establish a mechanical or optical contact between specific objectives. As a kind of cheap, flexible, and can accurately acquiring and processing data standardization of information technology, RFID technology is listed as one of the most important one of the top ten technologies in 21 st century. Its water proof, antimagnetic, high temperature resistant, easy to read and write, cheap, flexible and non-contact operational features are widely recognized, and application in various fields. However, with the continuous development of RFID technology and its application popularization, the security problems are increasingly prominent, thus caused the attention of the experts both at home and abroad, in recent years some security protocols and analysis were successively put forward.After fully understand the composition of RFID system, this paper comprehensive analyzed the RFID system's security requirements, vulnerable to attacks and countermeasures on the safety, and detailed summary to some of the existing protocols. Based on this, this paper put forward two kinds of multi-owners tag ownership security transfer protocol.One is Multi-owner ownership transfer protocol based on the Chinese remainder theorem. The protocol is mainly based on the idea of the secret sharing, segmentation and recovery of the shared secret. Further improved the security of tag ownership in the process of transformation. The scheme can not only resist replay attacks, man-in-the-middle attack, also ensure the tag information of forward and backward security.The second is Multi-owner ownership transfer protocol based on the Lagrange interpolation algorithm. compared with a single owner tag ownership transfer protocol this protocol have the advantages of the following two aspects. On the one hand, beneficial to prevent the owners due to right concentration abuse, On the other hand also to a certain extent to ensure the integrity and security of the Shared secret, At the same time it can resist counterfeit attack, replay attack and have the forward security and consequent security.Under the Linux environment, this protocol was achieved through simulation test and the experiment data about the calculate time of the tag was got. Then with the number of owners increasing gradually, different results were compared. The result shows that in the protocol, when increasing the owners' number, the calculate time of tag is in the acceptable range, which is also apply to the low cost tag.
Keywords/Search Tags:RFID, Ownership transfer, Chinese remainder theorem, Lagrange interpolation, Key share
PDF Full Text Request
Related items