Font Size: a A A

A Study On Privacy Protect In RFID Authentication Protocols

Posted on:2018-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:D R XiaFull Text:PDF
GTID:2348330542992593Subject:Information security
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID)technology,a kind of object recognition technology,can be used in open environment without physical or visual contact.RFID technology has been widely used in access control management,industrial automation,business automation,transportation management and other fields.However,with the fiery application of RFID technology in all walks of life,its potential security and privacy issues have aroused increasing attention.An integrated security protocol in an RFID system can largely resist the possible security and privacy issues.Aiming at the security and privacy problems of RFID technology,this thesis proposes two new RFID authentication protocols.First of all,this thesis summarizes the security and privacy issues that may be faced in the RFID authentication protocol and defines a privacy analysis model.According to the different methods used in authentication ID calculation,the existing RFID protocol are classified,and two kinds of typical RFID protocols are listed as examples.The authentication process and existing security problems are analyzed one by one.Secondly,taking into account the security and computational performance of RFID protocol,a new RFID security authentication protocol based on Hash function is proposed,which is called PPH protocol for short.PPH protocol mainly depends on Hash operation for the random numbers and other authentication information,so as to ensure good performance and high security.And then the security and computational performance of PPH protocol are compared with existing related protocols.Thirdly,to reduce the operation cost and guarantee the high security of the RFID protocol,a new RFID security authentication protocol based on elliptic curve(ECC)is proposed,which is called ESS protocol for short.ESS protocol mainly depends on the elliptic curve point multiplication,and its security performance is ensured by the elliptic curve discrete logarithm problem,so as to ensure lower protocol and higher security.And then the security and computational performance of ESS protocol are compared with related protocols.Finally,two protocols are actualized by software simulation based on Flask frame to show the feasibility of the proposed protocols.
Keywords/Search Tags:RFID, Authentication Protocol, Privacy, Security, Hash function, ECC
PDF Full Text Request
Related items