Font Size: a A A

Research And Application Of RFID Authentication Protocol Based On ECC

Posted on:2019-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2428330596465649Subject:Logistics management
Abstract/Summary:PDF Full Text Request
As a wireless information sensing technology,RFID is a foundation to realize the pervasive computing—IOT,which communication security directly determines the security of the Internet of things.At present,the most existing RFID security protocols are based on simple XOR or hash operations,resulting its security is difficult to be guaranteed,and the more secure traditional encryption algorithm cannot be directly applied to the RFID system due to limited RFID tag computing resources.Therefore,the lightweight research of traditional encryption algorithms and the application of security protocols based on traditional encryption algorithms are the key to improving the security of existing RFID systems.For this reason,this paper mainly carried out the following research work:(1)Research on lightweighting of the asymmetric encryption algorithm ECC.Compared with several widely used lightweight algorithm algorithms,it is proved that ECC has good lightweight properties.The basic operations point addition and scalar multiplication of ECC is researched,the 2P +Q fast algorithm is introduced to improve the the efficiency of NAF algorithm and reduce the precomputation storage of the sliding window NAF algorithm.The improved ECC algorithm shows good lightweight characteristics and is more suitable for resource-constrained RFID systems.(2)Research on RFID security protocol based on improved ECC algorithm.A new improved RFID mutual authentication protocol is proposed by combining the advantages and disadvantages of the existing ECC algorithm based on the improved algorithm.By BAN logic analysis and security analysis,the security and scalability of the improved protocol.The improved protocol possesses excellent comprehensive properties via the comparison with the several existing RFID security protocols based on ECC algorithm.(3)The extended application research on the improved ECC based security protocol in logistics and supply chain system.The status identification bit is introduced to extend the improved RFID authentication protocol for electronic labels ownership transfer duing to the characteristics of the frequent flow of electronic labels in the logistics and supply chain environment,the extension protocol supports secure transfer and rollback of label ownership.The coding design of the electronic tag supporting the extension protocol is researched,the data model of encrypted RFID system is designed based on entityrelationship model.The core module of the encrypt RFID system is designed and implemented,which further validates the validity of the protocol.
Keywords/Search Tags:Radio frequency identification, Elliptic curve cryptography, Scalar multiplication algorithm, Lightweight algorithm, Authentication protocol
PDF Full Text Request
Related items