Font Size: a A A

Research Of RFID Authentication Protocol

Posted on:2019-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z W LiFull Text:PDF
GTID:2348330569995535Subject:Engineering
Abstract/Summary:PDF Full Text Request
As a kind of automatic identification technology,Radio Frequency Identification(RFID)technology has extensive and far-reaching application value in the modern information society.RFID technology originated in the enemy air force identification system in World War II,matured in the laboratory and the company's in-depth study,to the now widely used in the life of logistics,retail and military and other fields.However,as RFID technology gradually penetrates into all aspects of life,it brings convenience to people,but also brings security problems to people's privacy.An RFID tag,such as an individual carrying an item,may allow an adversary to track the subject's whereabouts.Since the development of RFID technology,the adopted security mechanisms have been divided into two major categories.The first category is based on physical methods of security mechanisms,usually using Faraday cage,Kill command and some active interference methods to shield or interfere with normal signals,such methods are costly.The other major category is based on cryptographic methods.In the early days,because of the limited computing power of tags,simple logic operations or hash functions are used to design authentication protocols.With the development of RFID technology,the computing power of tags has also increased,and authentication protocols can be designed based on public key cryptosystem.In particular,RFID authentication protocols designed based on Elliptic Curve Cryptography(ECC)have been widely studied in recent years.Compared to other systems,ECC-based RFID authentication protocols has shorter key,and its efficiency is greatly improved.Some RFID protocols currently proposed do not have better protection for the privacy of the tags,and malicious adversaries may be track them,and these protocols have high performance overhead.Therefore,it is of great research value to design a low overhead and high efficiency ECC-based RFID security protocol.The main contributions in this paper are as follows:(1)Compared with the traditional RFID system model,we introduce a new type of RFID system model.Under the new system model,RFID tags,readers,and back-end servers are independent of each other.Under this model,the privacy of the reader is more concerned,that is,whether the back-end server reveals the identity of the tag during the execution of the protocol.We proposed a new RFID authorization authentication protocol.Compared with the protocol proposed by Li et al.,the tag has anonymity.During the protocol run,the reader can finish authentication without having to calculate all tags,which reduces the computational overhead of the protocol.(2)Under the traditional RFID system model,we introduce and analyze the security problems of the EC-RAC-based RFID authentication protocol proposed by Lee et al.In order to improve the security of the protocol,the bidirectional authentication protocol of RFID proposed by Liao et al.was proposed,we point out that the tag's public key information of the protocol could easily be leaked,which led to the tag being traced by the adversary.Finally,we propose an ECC-based RFID bidirectional authentication protocol,which not only has the privacy protection of the tag,but also needs to be implemented with a lower tag computation cost.Compared with other protocols,our proposed ECC-based RFID mutual authentication protocol is more secure and efficient.(3)We set up a experiment environment based on the PBC(Pairing-Based Cryptography)library,and evaluate the performance of our two RFID authentication protocols.The experimental results proved the correctness of our theoretical analysis.
Keywords/Search Tags:RFID, ECC, Anonymous Authentication, Performance Cost
PDF Full Text Request
Related items