Font Size: a A A

Research On RFID Security Protocols Based On Hash Function And Elliptic Curve Cryptography

Posted on:2018-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2348330515978341Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of the Internet of things,people have deeply researched on wireless communication technology.Especially Radio Frequency Identification technology has been widely used in various fields.However,because of the special non-contact between the tag and the reader,the privacy and security of user data are difficult to be guaranteed.Therefore,people propose many authentication protocols.Based on the computational and operational complexity of the system,it includes lightweight authentication protocols based on simple logic operations,middleweight authentication protocols based on hash function,heavyweight authentication protocols based on cryptosystems.Among them,the middleweight and heavyweight authentication protocol s have the advantages of good performance and strong security,which is a hotspot in recent years.In the existing authentication protocols,however,most of protocols failed to take into account the security and the hardware requirements,which makes it difficult to achieve in the system.So,in this paper,we summarize the existing authentication protocols,and propose two improved protocols.(1)Firstly,we collate and summarize the concepts of the system components and the working principle.Considering the security and performance,we describe these design requirements in RFID system.Finally,we introduce two kinds of RFID security mechanisms,and analyze the advantages and disadvantages.(2)The theoretical foundation of hash function is introduced briefly.In the existing typical RFID security protocols based on hash function,we summarize and analysis the authentication process,the security and performance.And we draw the advantages and disadvantages of each authentication protocol.On this basis,we propose an improved RFID authentication protocol.The dynamic ID mechanism is used to update the tag and the server information.The protocol uses the challenge response mechanism,the pseudo random number generator and hash function to process the data between the tag,the reader and the server.We also give formal analysis and proof of the protocol by the tool of BAN logical.In the improved protocol,we not only take into account the limitation and particularity of the RFID system,but combine the security and privacy.In terms of the security and privacy,this protocol can effectively resist the common attacks such as forgery,replay,de-synchronization attack and so on.In terms of the performance,index mechanism is used in the database,and the time complexity of the cryptographic computation in the database is reduced to O(1).At the same time,the improved protocol can use the computation,storage and communication with little bits,which can reduce the cost and improve the efficiency and the scalability of the system.(3)We study some RFID authentication protocols based on elliptic curve cryptography,and introduce the definition of elliptic curve,group operation and elliptic curve discrete logarithm problem.In the existing security protocols based on elliptic curve cryptography,we analyze the authentication process in detail,and point out the deficiency.On this basis,we propose an improved RFID authentication protocol based on elliptic curve cryptography,and use the mechanism to achieve the authentication.Then we describe the implementation process and algorithm steps of the protocol.Compared with the counterparts in the security,it turns out that the improved protocol has advantages in the two-way authentication,the untraceable privacy,the extensibility and so on.Finally,we use Visual C ++ 6.0 software to achieve the simulation of the improved protocol.And we implement the generating parameters,the encryption and decryption parts and the authentication between the tag and the server,which shows that the protocol can be feasible.Through the researches and experimentations,the two improved protocols proposed in this paper can improve the security and performance.
Keywords/Search Tags:RFID System, Authentication Protocol, Hash Function, Elliptic Curve Cryptography
PDF Full Text Request
Related items