Font Size: a A A

Research On Cloud-based RFID Authentication Protocols

Posted on:2018-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:W WangFull Text:PDF
GTID:2358330518488074Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification)technology is called radio frequency identification technology.With the development of Internet of Things,RFID technology has a wider range of applications.In recent years,with the advent of the Internet plus,some Internet corporations believe that Internet of everything may be a new breakthrough in the information technical revolution.In the era of things interconnect,sensing devices are indispensable,and RFID tags have the characteristics of stable performance,convenience,low price and so on.There is no doubt that RFID should be the first choice as mobile interconnection technology.However,data security and privacy protection are often ignored during the deployment in the traditional RFID system,in addition,the scalability of system,the capabilities of data storage and query are also unsatisfactory.With the development of cloud computing,the systems based on cloud have been widely deployed by virtualization technology or service-oriented technology,and the combination of traditional RFID technology and cloud computing also has a good prospect.Data storage and data processing are carried out in the cloud,because the cloud is open,the level of security and trust of cloud service providers has brought some new technical challenges to system security.It is vital to protect the security of RFID systems in the cloud environment,considering the cost and efficiency issues comprehensively,authentication technology is the main protection way.In recent years,some cloud-based RFID authentication protocols have also been proposed,but most of them focus on functional applications,generally ignore security and privacy issues.Therefore,researches on cloud-based RFID authentication protocols are still a hot issue.With the diversification of cloud-based RFID system applications,during the design process of cloud-based RFID authentication protocol,protocols should not only pursuit accuracy and security,but also require for their efficiency,lightweight,and resist to various attacks.In this paper,a secure and efficient privacy property protection protocol is proposed first,it is for a scenario that a cloud-based RFID system deployed in the field of Internet of Things.The protocol with the capacity of real-time processing and storage by virtue of cloud,not only solves the security issues efficiently,but also monitors and protects intelligent home devices roundly.Compared with the existing protocols,the protocol achieves the mutualauthentication based on the hash function.While improving the performance,it considers the privacy of the tags as well as the reader.Secondly,a new cloud-based lightweight privacy protection protocol is proposed for the application of low-cost RFID tags in the area of the body area network.The protocol firstly applies logical encryption algorithms to the cloud-based RIFD scheme,which reduces the operation complexity markedly in the case of ensuring the security of patient data.The session serial number is combined with tag ID in the protocol as an index,so it can resist to denial of service attack.It is clever to introduce the effective synchronization check mechanism.The index will be checked in each session in specific order,and it effectively prevents the synchronization attacks.Compared with the previous cloud-based RFID protocols,the new protocol reduces the storage overhead and communication overhead,and the design of the fault-tolerant mechanism also offers a higher level of security,thus it is suitable for low-cost RFID systems.Finally,an anonymous ultra-lightweight authentication protocol is proposed,it can be applied in the cloud-based vehicle networking.The key and session serial number are used in the updating process of tag ID,and the tag ID is updated randomly in each session,so the attacker cannot guess the identity of the tag,thus the protocol ensures the anonymity of the user when sharing data,and improves the forward security under the premise of ensuring high efficiency.The synchronization attack detection unit is added to the protocol,meanwhile,the synchronization flag is set,thus greatly improving the operation efficiency of the protocol.In order to prove the security of the protocol,we use the BAN logic analysis method to prove the security of the protocol strictly,and the result shows that the protocol can achieve the scheduled security targets,so it meets the security needs.Finally,we also give the protocol security analysis.Analysis shows that this protocol not only reduces the communication overhead effectively and improves the user experience,but also achieves the complete anonymity under the premise of mutual authentication,which is suitable for the application of vehicle networking whose characteristic is frequent communication.
Keywords/Search Tags:RFID, Mutual Authentication, Lightweight, Anonymity, Synchronization, Cloud
PDF Full Text Request
Related items