Font Size: a A A

Design And Hardware Simulation Of ECC Based Low Cost RFID Authentication Protocol

Posted on:2020-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:J M WangFull Text:PDF
GTID:2428330602950619Subject:Information security
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification)is a non-contact automatic identification technology used to identify items in the Internet of Things.RFID has been successfully applied to various fields,including supply chain management,telemedicine,intelligent transportation,warehousing management and food safety,and has attracted wide attention.However,the open communication links in the RFID system make the RFID system more vulnerable to various types of attacks,such as information disclosure,deception,tracking and so on.Therefore,it is of great significance to study the security authentication and privacy protection technology of RFID system.At present,many RFID authentication protocols based on hash function,symmetric cryptography or public key cryptography have been proposed.Among them,the authentication protocol based on public key cryptography,which has flexible key management and strong security,has become a current research hot topic.Most of these protocols fail to take into account the security of the system and the hardware cost of the tags,which makes the protocol unable to be widely used in the RFID system.In order to solve these problems,in this thesis the low-cost RFID authentication protocol based on public key is studied and analyzed,and the obtained results are as follows: Firstly,the thesis focuses on the security and performance of RFID system,an authentication protocol based on Elliptic Curve Cryptosystem(ECC)is designed,which is suitable for lowcost tags.This protocol realizes the mutual authentication between reader and tag,ensures the security of RFID communication system,and reduces the computation and storage resources of complex operations on tags.The scheme solves the problem of updating the secret value of the tag and avoids the scalar multiplication on the tag.Secondly,on the basis of the above authentication schemes,a low-cost RFID group tag authentication protocol based on ECC is designed.The protocol realizes the mutual authentication between a reader and a group of tags,and can identify illegal tags in the process of protocol authentication,and informes them to users.The scheme solves a series of problems such as high time-consuming,low efficiency and poor security when group tags authentication occurs,and has better security and practicability.Then,BAN logic reasoning rules are used to formalize the above two schemes,and AVISPA analysis tools are used to detect the security of the protocol in combination with HLPSL language.In addition,the security and performance of the proposed scheme are compared with similar protocols in recent years.The results show that the proposed protocol is secure and effective.Finally,considering the hardware resource consumption of low cost tags,the resource consumption of RFID tags in the protocol is simulated and analyzed.According to the two protocols,the main resource consumption on the tag comes from hash function and big number multiplication.In order to verify the resource consumption on the tag,The hardware logic structure of the lightweight hash functions PHOTON-128/16/16 and 16*128 multipliers selected in the protocol are designed and analzsed,and the Vivado simulation tool is used to simulate and synthesize the hash algorithm and multiplier.The consumption of hardware resources is obtained.The results show that the resource consumption of the protocol on the tag meets the requirement of low cost.
Keywords/Search Tags:ECC, RFID, BAN logic, AVISPA tool, Vivado simulation
PDF Full Text Request
Related items