Font Size: a A A

Research And Design Of Low Cost RFID Group Tag Authentication And Ownership Transfer Protocol

Posted on:2019-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2428330566982986Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID),as one of the important technologies of the IOT perception and recognition layer,has been deepened with the continuous development of the Internet of things,from the reform of the identification of enemy aircraft in the second world wars to the current commercial applications such as identification,access control,vehicle charging and unmanned collection.In this paper,from the various RFID security protocols existing at home and abroad,two typical RFID tag application scenarios,group tag proof generation and transfer of ownership of the tag,are analyzed.In combination with the characteristics of RFID tag groups,a secure RFID group tag proof generation protocol and a group tag ownership transfer protocol for low-cost applications in traditional RFID systems,and the label ownership transfer protocol in the cloud computing environment are designed..The existing group tag proves that there is a large amount of tag calculation and high storage cost,which can not be well adapted to the practical application of low cost passive tags,and the security problems such as theory proves to be incomplete,incomplete authentication,forgery attack and so on.Therefore,this paper proposes a lightweight group tag proof protocol based on rotation function.This agreement gives a complete group tag proof generation framework.In order to reduce the tag cost,the protocol introduces the ultra lightweight round robin function and the cyclic shift operation.In order to avoid malicious attacks caused by cyclic shift operations and other security defects,this protocol uses the nonlinear function MIXBITS()and the unique Mark session identifier to generate a group proof signature..Finally,the attacker model is established based on the random oracle model,and the framework of the protocol security model is defined,and the security of this protocol is proved respectively from the authentication and privacy.Most of the existing group tag ownership transfer protocols are mostly trusted third party updating and sending the key,which is bound to increase the risk of system management and the risk of information disclosure.Because of the lack of formal analysis and verification,there are problems such as key leakage and backward privacy in the protocol.Aiming at the above problems,this paper presents a lightweight RFID group tag ownership transfer protocol based on group signature.The agreement can only complete the authentication transfer process with the three party of tag,reader and background database.This agreement can make the tags in the group calculate at the same time and have higher efficiency.The group signature generation and authentication process based on the quadratic residue algorithm can smoothly realize the security transfer of the ownership of the group tag,and avoid the security problems such as the back privacy disclosure and so on.Finally,we build a security model and design the RFID group tag ownership transfer ideal function F for security requirements under the general security framework,and simulate the interaction between the attackers on the real protocol entity under the ideal model to prove the security of the protocol.With the continuous development of the Internet of things,the application of RFID technology is becoming more and more large.The cost of deployment and communication of the traditional RFID system architecture is higher when we need to deal with the massive RFID tag data.The related ownership transfer protocol will not meet the application requirements.In view of the above practical application and the new security problem of RFID in the cloud environment,a new RFID tag ownership transfer protocol based on unidirectional proxy re-encryption is proposed in this paper.This protocol introduces a one-way proxy re encryption mechanism on the cloud server side to solve the semi trusted threat in RFID cloud architecture system.Using the two residual and unidirectional pseudo random function basic algorithm to encrypt the transmission data,the secure transmission and transfer process of communication data is realized.Finally,a complete,universal and composable security proof protocol is given.Compared with traditional schemes,the new protocol has great advantages in terms of deployment cost and security.
Keywords/Search Tags:Radio frequency identification, Group, Group proof, Ownership transfer, Random oracle model, General composable security framework
PDF Full Text Request
Related items