Font Size: a A A

Research Of RFID Security Authentication Protocol Based On Hash Function

Posted on:2018-10-24Degree:MasterType:Thesis
Country:ChinaCandidate:M TangFull Text:PDF
GTID:2348330512983267Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With its rapid development,radio frequency identification(RFID)systems have been generally applied in commercial,military and every day's life.Nevertheless,due to the limited in-chip hardware resources of tags,information and data security have become one of the crucial problems.In the large distributed RFID system,the insecurity of channel between reader and tag makes the backend server need to authenticate reader and tag at the same time.Many protocols ignore this need and assume channel between reader and backend server is safe.The thesis first summarized the structure of a RFID system and how such system works,then introduce the application of RFID technology in industries.Thesis also summarized the requirements of RFID system security,common RFID system attacks and the existing security mechanism.Then some typical authentication protocols based on hash function have been analysed.On this basis,author proposes a novel hash based authentication protocol.This protocol uses pseudo tag ID,tag authentication code,reader authentication code and hash computation of random number to accomplish the bidirectional authentication between backend server,reader and tag.The pseudo tag ID,tag authentication code,reader authentication code could be updated dynamicly.The protocol provides anti-collision,data synchronization mechanism.BAN logic is used to build an ideal model of the new protocol and conduct formalize analyses.AVISPA tool set and hardware platform are used to test the proposed protocol,it is concluded that the protocol can resist eavesdropping,replay attack,desynchronization attack and other common attacks while only use comparatively small memory and computational resources.It guarantees the security of data transmit in the RFID systems and user privacy,accomplish mutual recognition of terminal devices and backend server.The proposed protocol is suitable for large distributed systems.
Keywords/Search Tags:RFID, hash function, security, authentication
PDF Full Text Request
Related items