Font Size: a A A

Research Of Lightweight Authentication And Encryption Technology In Internet Of Things

Posted on:2018-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2348330536479635Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
RFID is the key technology in the sensing layer of the Internet of Things.It is widely used in various fields because of its anti-pollution,strong recognition,no barrier reading and fast transmission speed.But the RFID system environment also faces eavesdropping,tracking and counterfeiting and many other security threats.Because of its limited resources,there are many restrictions on bandwidth,energy.Existing security protocols cannot adapt to the harsh environment.Therefore,it is of great significance for the development of the Internet of things and the popularization of RFID technology to study the application of lightweight authentication and encryption technology in RFID environment.After deeply studying the composition and the security threats of RFID system,a new RFID authentication protocol based on the traditional OTP authentication is proposed.Any number and time stamps are introduced in the authentication information,and the sensitive information in the authentication process is encrypted by the ECC algorithm to ensure the confidentiality of the authentication information.In the research of lightweight encryption algorithm in RFID environment,this paper analyzes the security efficiency of the existing lightweight encryption algorithm and the underlying computing efficiency of various cryptographic algorithms.Through the analysis,It is found that the elliptic encryption algorithm has the advantages of high security,fast processing speed,small storage space and low bandwidth requirement,but its lightweight level is still low.After depth study of the elliptic curve cryptography algorithm running process,it is found that the scalar multiplication is the key operation in the process of encryption and decryption.The operation efficiency determines the overall efficiency of the algorithm code.Therefore,based on the traditional double-base scalar multiplication algorithm,and combined with the idea of generalized double-base chain,a new scalar multiplication algorithm based on new double-base is proposed.In this way,the half-point operation of point group is used to replace the double-point operations.And at the same time,expanding the coefficient set of base,which further reduces the computational redundancy.Combining the improved ECC algorithm with the RFID bidirectional authentication protocol,the BAN logic is used to prove the formal logic of the proposed RFID authentication protocol before the simulation is carried out.And then in the JDK environment,verifying the effectiveness and practicability of the RFID two-way authentication protocol based on improved ECC algorithm by simulation.Depend on the feasibility and security analysis of the protocol,the RFID two-way authentication protocol based on ECC and OTP meets the basic security performance requirements of the RFID environment.That can resist various attacks such as tracking,replay and counterfeiting.At the same time,it realizes the tow-way authentication between the tag and the database,and improves the security of the RFID environment.According to the computational complexity analysis of the improved ECC algorithm,the new double base chain algorithm can effectively improve the efficiency of the elliptic curve cryptography algorithm,which is about 30% higher than that of the original double base chain scalar multiplication algorithm.The formal logic of BAN proves that the protocol meets the requirement of preset.Thus,the correctness of the authentication protocol is verified logically.The simulation results further demonstrate that the RFID tow-way authentication protocol is feasible and effective.
Keywords/Search Tags:Internet of Things sensing layer, Radio Frequency Identification, Lightweight authentication, One-time certification, Elliptic cryptography, scalar multiplication
PDF Full Text Request
Related items