Font Size: a A A

Research Mobile RFID Authentication Protocol Based On Dynamic Key

Posted on:2017-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:R ChenFull Text:PDF
GTID:2348330521950552Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)technology is a non-contact automatic identification technology.It can identify specific target automatically and obtain the relevant data and information through radio frequency signal.With the rapid development and integration in the global economy,the application of RFID technology will welcome more brilliant prospects.And its economic value potential is vast.However,The security problem in RFID system has become an important factor of restricting its application and development.And the RFID technology will be difficult to further promote and use if the security problem can't be solved well.At the same time as the application of RFID technology is more and more extensive,the request to the security,mobility and flexibility of the system keeps higher and higher.So it becomes a hot research topic in the field of RFID to design an authentication protocol,which can not only effectively solve the problem of RFID security and privacy but also meet the mobile RFID system.In this background,this thesis analyzes the types of attacks and the security mechanism of the existing RFID system,dissects the deficiency of the existing the solution to security problems of RFID system,and also introduces the composition of mobile RFID system and the additional safety concerns.It analyzing the advantages and disadvantages of some existing RFID authentication protocol,find that if there is an attacker launch DOS attack to the server,which may lead to the system collapse.But,almost none of the existing security protocol can cope with these problems.So in order to restrain the DOS attack,this thesis presents an improved protocol,the double against denial of service attack mobile RFID security authentication protocol.Through the reader's pre-authentication of the label,the improved protocol can effectively solve part of impersonation label problem and prevent DOS attack.Meanwhile the server conducts a preprocessing operation to the reader,which prevents the impersonation attacks and denial of service attack to the server caused by the illegal reader.Secondly,in order to better protect the safety of RFID system,the researchers designed some key-updating protocols.However,these protocol are mostly complete the renewal of the key in the final steps.So if the label didn't receive the message in the final steps,the key update will be fail,which resulting in data asynchronous problem.To solve such problems effectively,this thesis proposes a new protocol-mobile RFID security authentication protocol based on dynamic key.The new protocol dynamically select authentication key based on random numbers,which not only ensure the key freshness,but also avoid the data asynchronous and tracking problems.Then the thesis analyzes the theoretical security and efficiency of thesetwo new protocols,and prove the superiority of the proposed protocols by comparing with the existing protocols.And the security proof for the new protocol has been carried out by using the GNY logic.Finally,to illustrate the availability of the new protocol,the article has carried on the simulated programming.In conclusion,the protocol can effectively prevent a range of attacks such as tracking and eavesdropping attacks,impersonation attack,data asynchronous attack,replay attack and denial of service attack.They meet the demand of the tripartite mutual authentication of identity of the mobile RFID system.These protocols are good movable and with low computational complexity.And compared with the existing protocols,the protocol has strong applicability,and can be widely used to reader mobility demanding fields such as civil logistics transportation,military application,medical application,etc.
Keywords/Search Tags:mobile RFID, Authentication protocol, Safety, Privacy protection, GNY logic
PDF Full Text Request
Related items