Font Size: a A A

Research On RFID Security Authentication Protocol In Wearable-device Environment

Posted on:2018-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:J S JiaFull Text:PDF
GTID:2348330512466944Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The new wave of wearable equipment has come and has driven the electronics industry to generate more and more emerging technologies.RFID is an technology that using the radio frequency signal to automatically identify and obtain information in the open environment.Because of its low cost and ease of use,RFID becomes one of the ten most important technologies in the twenty-first century.In recent years,more and more wearable equipment equipped with RFID modules to enhance the convenience of wearing equipment and authentication functions.It is very meaningful to study an RFID security authentication protocol that is suitable for wearable environments.The existing RFID authentication protocol is divided into four categories in storage capacity and algorithm complexity: heavyweight,middleweight,lightweight and super lightweight.Heavyweight and middleweight RFID protocols have high security performance,but their overhead is large and does not apply to wearable environments.Ultra-lightweight RFID authentication protocol algorithm uses only a simple logic,although the overhead is small,but it can not guarantee the security of the certification process and vulnerable to security attacks.The lightweight RFID protocol uses the random number generator and other algorithms,in the protection of the case is not expensive,can resist common security attacks,is very suitable for use in a wearable environment.Some of the current lightweight RFID authentication protocols and their defects are studied in this thesis.This points out the need for research on lightweight RFID authentication protocol.Then,the thesis focuses on the LMAP + protocol proposed by Li,analyzes its flow in detail and simulates its protocol vulnerability by mathematical method,that is,it can not resist the tracking attack.In this context,this paper proposes an improved ILMAP + protocol and proposes two optimization schemes for the security vulnerabilities of LMAP + proposed by Li.Then,the security of the optimization scheme is analyzed theoretically,which proves that it can resist the tracking and achieve the purpose of optimization and compare the safety and efficiency of the other protocols.Finally,thethesis simulations the protocol with APK in the form of Android system.The experimental results of the two optimization schemes are compared and the more suitable scheme is selected to verify the practicability of the protocol.In this thesis,the ILMAP+ protocol overcomes security flaws of the original protocol,successfully resists tracking attacks,improves the security of the original protocol.The efficiency of the proposed scheme is higher than that of the original protocol.The ILMAP+protocol has both to high security and a lower cost,and has a very high practical value in the wearable environment.
Keywords/Search Tags:wearable-device environment, RFID security, RFID authentication protocol, Android system
PDF Full Text Request
Related items