Font Size: a A A

Research Of RFID Identity Authentication Protocol Based On Hash Function

Posted on:2019-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:B YangFull Text:PDF
GTID:2428330545957837Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the widespread application of RFID technology,the emerging security issues have become an important obstacle to the widespread application of RFID technology.Two types of solutions are physical methods and cryptographic-based security protocols for security vulnerabilities in RFID technology.And the security protocol has become the focus of the research with the advantages of low cost,recycling and convenience.The existing security protocols are mainly divided into two categories: static ID-based security protocols and dynamic ID-based security protocols.This paper proposed two protocols for the security risks of the two protocols respectively,and author proves the proposed protocols with BAN logic.Specific research work is as follows:This following describes the relevant knowledge of RFID systems in detail,including system composition,working principle,system standards,etc.,especially the RFID security issues and security needs.Two kinds of solutions are respectively introduced to the security problems.The emphasis is on the development and detailed comparison of five typical security protocols based on Hash function at home and abroad.According to the problem of the tag anonymity of existing static ID security protocols,this paper proposes an improved static IDs security protocol.The tag operations in this paper are divided into two parts,one part is used in response to reader request;the other part is used to verify the legitimacy of the reader.And the paper analyzes the security and efficiency comparison of the improved protocol and proves the security of the protocol with BAN logic and simulates the improved protocol on the J2 SE platform.Finally,the protocol is proved that good security,efficient and practicality.According to the database non-synchronization problem of the existing dynamic ID security authentication protocols,this paper introduces a new security dynamic ID authentication protocol.The new protocol sets the expected communication delay so as to effectively prevent illegal attacks.The index value and its own identifier are updated at the same time which improves the security of the system.And the paper analyzes the security and efficiency comparison of the improved protocol and proves the security of the protocol with BAN logic and simulates the improved protocol on the J2 SE platform.Finally,the improved protocol is proved to meet the system requirements of RFID.
Keywords/Search Tags:RFID systems, authentication, security protocols, Hash function, BAN logic
PDF Full Text Request
Related items