Font Size: a A A

Research On Serverless RFID Secure Search Protocol

Posted on:2019-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:S PengFull Text:PDF
GTID:2428330548495007Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet of Things technology,traditional QR codes and bar code identification technologies have problems such as simple information and insecurity,which can't satisfy the development requirements of the current identification technology.But Radio Frequency Identification technology(RFID)has the features of simple interaction and abundant information,so it has attracted wide attention of scholars.However,quickly searching the target tag in Intelligent warehousing,supply chain and other field through RFID technology has high practical value.The thesis first research the RFID secure search protocol without backend database and a secure RFID search protocol is implemented in case that the back-end database can't be connected with the reader.In the thesis,Collins Mtila's protocol is analyzed and researched.Based on the Shannon's theorem,a new improvement scheme is proposed for the protocol's shortcomings,and a light-weight and more secure search protocol is proposed and implemented.The protocol uses random numbers to generate blind factors to obfuscate messages and uses timestamps to resist replay attacks.It replaces the original HMAC function with a lighter weight encryption method,and improves the performance of the protocol.Finally,the security of the protocol is proved through simulation experiments.In order to make the application of search protocol more extensive,this thesis studies the search protocol and realize a cardinality estimation protocol of the specific tag set.Based on the search protocol,a deterministic cardinality estimation protocol is implemented firstly,and then the shortcomings of the protocol that does not satisfy the large-scale application scenarios are analyzed.Finally,the thesis studies the mechanism and difference of Mo Li,Feng Zhu et al.'s Aloha protocol.On this basis,we propose a cardinality estimation protocol based on the merits of their protocols and prove the feasibility of estimation through mathematical derivation,then the parameters optimization of the protocol are analyzed.Finally,the simulation experiments verify the security of the RFID search protocol without backend database and the feasibility of the improved cardinality estimation protocol.It proves that the cardinality estimation protocol is efficient under large-scale application scenarios.
Keywords/Search Tags:RFID Secure Search Protocols, Cardinal Estimation, Blind Factor, Time Stamp
PDF Full Text Request
Related items