Font Size: a A A

Research And Implementation Of Security Authentication Protocol For RFID System

Posted on:2020-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:J DingFull Text:PDF
GTID:2428330590495342Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID)is an automatic identification technology for non-contact energy transfer and data transmission through radio frequency signals.Because of its own advantages,RFID has been widely used in many fields such as commercial automation,industrial automation,transportation,traffic control system,access control system,storage management,and animal husbandry management and so on.However,while RFID technology brings convenience to our daily life,its potential safety hazards are gradually exposed.Attackers can perform various attacks on RFID systems by intercepting radio frequency signals,such as cloning attacks,denial of service attacks,and replay attacks,which has caused security problems to RFID technology applications.In this thesis,the existing RFID security authentication protocol is researched and analyzed.Novel RFID authentication protocols are designed for tags which have limited computing power and low authentication efficiency.The main research contents are as follows:1.Lightweight RFID security authentication protocol.Because the computing power and storage capacity of passive RFID tags are limited by their own hardware,it is impossible to run those computationally intensive encryption algorithms.In order to solve this problem,the combination of physical unclonable technology and lightweight cryptography technology is mainly used to realize lightweight RFID tag anti-counterfeiting.The authentication protocol mainly consists of a mutual identification phase,a mutual authentication phase,and a key updaing phase.The authentication protocol updates the pseudonym identification and the keys of the back-end server and the tag after each authentication,so as to improve the robustness of the RFID system and defend against various attacks on the RFID system by attackers.Theoretical analysis and experiment result show that the lightweight RFID security authentication protocol can effectively resist a variety of common attacks and ensure the security of RFID systems.2.RFID security authentication protocol based on multi-proof interaction mode.In a large-scale RFID system,multiple tags are often involved in the authentication at the same time.If multiple tags are not authenticated one by one,but are verified at one time,the overhead of computation and communication in the process of authentication can be greatly reduced.Based on the above situation,a RFID security authentication protocol based on multi-proof interaction mode is proposed.In the protocol,the reader first aggregates the information of the plurality of tags read to form a collaborative signature.Then the backend server verifies the collaborative signature.Theoretical analysis and experiment results demonstrate that RFID security authentication based on multi-proof interaction mode can effectively improve the efficiency of the authentication of and can also guarantee the security of RFID system.3.Design and implementation of anti-forgery authentication system based on RFID security authentication protocol.For the food safety traceability application,by combining with the lightweight RFID security authentication protocol and the RFID security protocol under the multi-certification interaction mode together,the anti-counterfeiting authentication system based on the RFID security authentication protocol is designed and implemented.The system can automatically select an authentication protocol based on the number of tags and perform anti-counterfeit authentication on tags.
Keywords/Search Tags:Radio Frequency Identification, Physical Unclonable, Security Authentication Protocol, Lightweight Security Authentication, Multi-proof Lnteraction Mode
PDF Full Text Request
Related items