Font Size: a A A

Research On Authentication Protocol Of RFID System Based On Elliptic Curve Cryptography

Posted on:2019-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y H GuoFull Text:PDF
GTID:2348330542983198Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Radio Frequency Identification(RFID)technology and the deep fusion in many fields,the security and privacy of RFID system are becoming more and more prominent.At present,there are two kinds of security protection system for RFID system based on physical mode and cryptography technology.Physical methods are usually Kill tags,renamed,and blocking ways.Although these operations are direct operation,they only provide simple information protection,and there are security limitations.Therefore,the exploration of RFID system security mechanism based on cryptography technology has become a hot topic.At present there are many scholars put forward the encryption algorithm and security authentication protocol Hash function,symmetric key or asymmetric key based,but most of them are considered to reduce the cost of RFID tags,there is still a security risk.In special and critical areas,such as military,commercial,financial and public security,the security performance of the RFID system is higher than the cost.Therefore,we need to propose a more efficient and more efficient security scheme to meet the security requirements of the RFID system.This paper will focus on the key technology of RFID system security and related issues,and its specific innovation and research content are as follows:(1)we use the elliptic curve cryptography(ECC)characteristics of short key,high security and small storage space,and in view of the typical RFID system authentication protocol and the existing defects in the existing authentication protocol based on ECC,a mutual authentication protocol of RFID system based on ECC is designed.The feasibility of protocol interaction is illustrated by examples and related elliptic curve safety parameters.The BAN logic is used to formally analyze and verify this protocol to achieve the expected security requirements.(2)This article analyzes the security of the protocol in detail through the security features and the resistance to attack.The design of the protocol in comparison with other similar application protocol in resistance tracking attack,denial of service attack,replay attack and impersonation attack and other common attacks have good reliability,and can satisfy the mutual authentication,confidentiality,anonymity and forward security.This paper compares with other related authentication protocols in terms of the cost of the protocol,the storage needs and the communication overhead.It shows that the protocol required for scalar multiplication operation times were 3 times,the algorithm can reduce the tag computational cost by 0.59%-60% respectively,while the implementation of the RFID system to improve the efficiency of 40.2%-70%,it also has obvious advantages in storage requirements and communication overhead.The authentication protocol designed in this paper can not only satisfy better security and privacy,but also improve the speed of the system operation,and effectively solve the security problems of the current RFID system.And the protocol can be applied to the key fields of military logistics management and classified document security.
Keywords/Search Tags:Elliptic Curve Cryptography, RFID, Authentication protocol, BAN logic, Security
PDF Full Text Request
Related items