Font Size: a A A

Research On Authentication Method Using Hash Function In RFID

Posted on:2019-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:H YinFull Text:PDF
GTID:2428330596979084Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)technology is a technology that uses specific frequency radio signals to achieve close proximity and non-contact communication.With low cost,low power consumption and fast recognition spceed,RFID system has developed rapidly in the field of logistics supervision,access control system and electronic automatic charging.There are also security risks in RFID technology;(1)First of all,RFID is mainly suitable for rresource constrained devicces with low computing storage capacity and only limited energy sources,so the encryption system can not be too complex.(2)Secondly,the RFID system uses wireless open communication links to read and write tags,which is very easy to be eavesdropped and interfered.Traditional encryption algorithms and authentication protocols under resource-constrained conditions arc difiicult to apply directly to RFID systems.Therefore,lightweight algorithms are required for encryption algorithms and authentication protocols.This paper analyzes the security problems and solutions of RFID system,and studies the lightweight encryption algorithm and authenlication protocol in resource-constrained environment.Thespecific research contents are as follows:(1)According to the particularity of the resource-constrained environment such as RFID,a lightweight hash function based on the Sponge structure is designed to meet the requirements of hardware and software elficiency of the algorithm.The results of dependency testing and security analysis show that the algorithm has good diffusivity and collision resistance,and can nieet the security requirements of the resource constrained environment.The efficiency test shows that the hardware implementation scale of the algorithm is about 1043 gate equivalents,which is lower than the requirements of 2000 gate equivalents at low cost.The efficiency of the software implementation is better than the Keccak algorithm with the same structure.(2)This paper analyzes the common authentication protocols used in RFID systems.In order to solve the security and efficiency problems of some authentication protocols based on Hash function,an improved protocol based on Hash function and asymmetric key is designed.Using asymmetric key can improve system security.The update mechanism built using Hash function and access counter can effectively resist desynchronization attacks.The security and performance analysis of the protocol show that the protocol can resist common active attacks and improve the efficiency of tag retrieval and authentication.In conclusion,the lightweight Hash function proposed in this paper and the bidirectional authentication protocol based on this function can be well adapted to the resource-constrained environment such as the RFID system,and can meet the performance and security requirements of the RFID system.
Keywords/Search Tags:RFID, Lightweight, Hash function, Authentication protocol
PDF Full Text Request
Related items