Font Size: a A A

Technical Research On Ownership Transfer And Two-way Authentication Protocol For RFID Systems

Posted on:2019-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y GuanFull Text:PDF
GTID:2428330596959824Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID)systems generally include tags,readers,authentication systems with identity and authorization,and databases.Among them,because of its low cost,small size and long life,the label has been widely used in different fields such as transportation(such as bus card system),security(such as access control system),and medical treatment card.In its widespread use,the two-way authentication problem and ownership attribution of RFID systems are becoming more and more prominent.Two-way authentication problem: the two parties cannot ensure that their identity is valid,easy to be forged by the attacker,etc.,there are certain security defects;ownership ownership problem: after t he ownership of the label changes,the original owner can no longer access the label,and the new owner Nor can I access the information of the original owner.Existing solutions have problems such as high cost or large amount of calculation or security vulnerabilities.On the basis of summarizing many solutions,in order to solve the first problem,this paper proposes an authentication protocol solution to solve the first problem;Two questions,this paper designed a ownership transfer agreement to solve the second problem.In view of the existing schemes,there are problems such as high cost or large amount of calculation or security loopholes.On the basis of summarizing many schemes,a scheme capable of solving the above problems is proposed.The specific main research contents of this paper work as follows:1.A two-way RFID authentication protocol based on PRF(Pseudorandom Function)is presented and implemented for lightweight applications to solve the two-way authentication security problem between tags and readers.Mainly suitable for lightweight applications,such as: access control system.In the two-way authentication protocol,the reader and the authentication server use different one-time random numbers respectively.To keep the freshness of each transmitted message,it can resist the attacker's replay attack and tracking attack.In addition,the tag's unique identifier ID(Identification)is hashed and then divided into three parts.Use ID as the variable to be used in the calculation process.Thereby reducing the introduction of other information,thereby reducing the space required for storing other information,thereby effectively reducing the cost of the label.2.An RFID-based authentication protocol based on bit-wise operation is presented and implemented for ultra-lightweight applications to solve the authentication security problem between the reader and the tag.It is mainly suitable for ultra-lightweight applications,such as : Bus card system.The bitwise operation described in the protocol is to construct two special cryptographic operations that belong to the lightweight category: a word-based synthesis operation based on bitwise operations and a cross-bit operation.Both of these operations are based on bit-wise operations,so the amount of computation is attributed to the ultra-lightweight category,making the proposed authentication protocol ultra-lightweight.In the proposed protocol,the random number is no longer generated at one end of the label,and the random number generator is no longer needed,which can reduce the cost at one end of the label.The reader generates two random numbers at a time,and transmits them to the label in ciphertext after being encrypted.One random number is used to keep the freshness of the message transmitted by the reader,and the other random number is used to keep the label transmitting information.Freshness.In the proposed authentication protocol,the unique identifier ID of the tag is no longer transmitted in plain text,and the tag end is introduced with the pseudonym ID_S,which can confuse the attacker and ensure the security and reliability of the authentication protocol.3.A RFID ownership transfer protocol based on hash function is given.The premise and basis of the security authentication protocol is secure communication.When the ownership of the RFID tag needs to be transferred,the ownership transfer protocol is particularly important.The ownership transfer protocol is realized.The basis is security certification,but the focus is different.How to achieve the safe transfer of label ownership transfer between different label owners is more concerned,to ensure that the privacy of the other party after the ownership of the security label is transferred.It does not infringe on each other.Therefore,for RFID systems,the ownership transfer protocol will only run when the ownership of the label is transferred.Otherwise,the system only needs to run the security authentication protocol.During the label life cycle,the ownership of the label is The time will change.This paper completes the ownership transfer by designing a simple,efficient and secure label ownership transfer protocol for low-cost RFID systems.Compared with the existing protocols,the protocol is safe and efficient.Both have improved.In this paper,the hardware requirements of the tag end in the RFID system are further reduced in the lightweight-based hash function authentication protocol,which is mainly manifested in the fact that the tag end does not need to implement the modulo operation or the square calculation,mainly using HASH function or pseudo-random function for encryption.In this way,the calculation amount of the tag end is greatly reduced.Based on the above factors,the protocol is widely promoted and applied in the existing RFID system.
Keywords/Search Tags:radio frequency identification, ownership transfer protocol, two-way authentication protocol, bit operation
PDF Full Text Request
Related items