Font Size: a A A

Research On Mutual Secure Authentication Scheme For Mobile RFID

Posted on:2019-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:W JiangFull Text:PDF
GTID:2428330572951521Subject:Engineering
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)is one of the core technologies in the Internet of Things(Io T).With the continuous evolution of mobile communication technologies and the practical application of innovative technologies such as big data and cloud computing,Io T technology has developed rapidly.Io T aims to achieve the interconnection of everything,requiring a massive amount of terminal sensing equipment.By virtue of thecharacteristics like low cost,excellent performance and noncontact identification,RFID tags have greatly promoted the rapid application of RFID technology in various Io T scenarios.But with the awakening of social security awareness,many security and privacy threats arise in the those applications of RFID technology,whcih have gradually catch the focus of people's attention.In the context of mobile Internet,RFID systems are generally deployed in an open environment,which not only poses new security challenges for the mutual authentication of system entities,but also greatly increases the necessity of identity anonymization.In addition,the mobile RFID system has a larger scale and more more users,therefore it is necessary to effectively protect the system against attacks such as malicious tracking,and to reduce the application cost of the system.In this paper,a lightweight RFID medical privacy protection protocol for Io T medical applications is proposed.The scheme realizes the effective concealment of tag information through the defined simple and efficient logical operations,at the same time it reduces the system cost and effectively protects the user's personal identity information and data security.The protocol stores data in a form of indexed data tables in the database,which improves the ability of data retrieval and is well protected against malicious access by large-scale attackers.Mutual security authentication is well achieved in this protocol,and the synchronization of confidential information and the synchronization check mechanism enhance the availability and reliability of the system.The proof process on the protocol with BAN logic rules indicates that the scheme satisfies the security requirements of the system and can be well applied to the Io T medical field.Taking the application of large-scale Internet of vehicle(Io V)networking into account,we propose a cloud-based privacy protection protocol.This scheme adopts Schnorr's identity authentication mechanism to achieve anonymity of RFID tag's identity effectively and privacy security such as sensitive location information.In this protocol,the identity information of the tag updatesin each round of the session,so it is difficult for an attacker to crack the true identity information of the tag,which meets the important security requirements of system anti-tracking.In Io V networking,the real-time processing of data is indispensable,in this connection the protocol achieves the consistency of system information by completing the information update and setting the synchronization flag bit check during the session,based on which the fault tolerance mechanism is realised to improve system availability and stability.Facing massive data in Io V system,the scheme effectively combines cloud computing and RFID,not only improving the system's data processing capabilities,but also strengthening the system's effective defense against denial of service(Do S)attacks and some other similar actions,therefore the proposed protocol is very suitable for Io V scenes.In order to prove the rationality of the protocol,we use the BAN logic rules to analyze the logic security of the protocol.The analysis process shows that the protocol's security objectives can be effectively implemented and meet the security requirements of the system.
Keywords/Search Tags:RFID, Mutual Authentication, Privacy Protection, Anonymity, Synchronism
PDF Full Text Request
Related items