Font Size: a A A

Anti-asynchronous Attack RFID Identity Authentication Protocol Based On Hash Function

Posted on:2018-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:L Y LiFull Text:PDF
GTID:2348330518999445Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the integration of radio technology and information technology,Internet of Things(IOT)is developing at an unprecedented rate and becoming more and more close to people's life.As the core technology of the Internet of things perception layer,RFID has gradually become the most concerned technology in the field of automatic recognition because of its many advantages.The large-scale application of the RFID industry has become an internal demand for social economic transformation and upgrading,and will also provide strong impetus for national defense construction.RFID information is transmitted by wireless channel,the openness of communication brings freedom and convenience to the user,however,the issue of information security and privacy has been highlighted.But,there are various defects that exit in the security mechanism based on physical method and security authentication protocol based on cryptography.Moreover,with the constraints of the RFID tag design costs,complex security encryption algorithm and the traditional methods cann't be directly applied in the system.Hence,studying and designing a security,efficient,low-cost authentication protocol with security,efficiency and low-cost is particularly important for promoting the RFID technology.This paper studied and analyzed the research status of RFID technology at home and abroad,and expounds the security requirements of the system for the attacking methods faced by RFID system.By studying the strengths and weaknesses of the existing RFID authentication protocol,combining synchronous code in the Keeloq technology principle,this thesis proposes a RFID two-way authentication protocol based on synchronous code.The main work is given as follows:1.Proposed a protocol program.Introducing the mechanism of synchronous window in refresh mechanism of identity authentication protocol based on dynamic ID,which is used to solve the asynchronous problem of data.Synchronization code are dynamic refresh during each certification,which can solve the problem of replay attacks;hash operation result is divided into two parts,these two parts are separately used to the authentication for the label and the database,which effectively reduce the label cost and computational complexity.2.This thesis analyses the anti-attack ability of the protocol.From storage ability and computation ability,this thesis analysis the advantage compared with other protocol.Then,this thesis formalizes the protocol using BAN logic,illustrating this protocol not only can resist various security threats,but also can save the cost and improve the operation efficiency.3.In the Windows 7 environment,this thesis uses Java language to implement the protocol simulation system,and evaluates the security of the protocol.By resisting attacking simulation,the protocol proposed in this thesis is proved that is can resist database impersonation attacks,label impersonation attacks and asynchronous attacks,which is a safe and reliable authentication protocol.
Keywords/Search Tags:RFID, Security, Authentication protocol, synchronization code, Hash
PDF Full Text Request
Related items