Font Size: a A A

Research On Authenticaction Method Based On Hash Function In RFID System

Posted on:2021-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y SongFull Text:PDF
GTID:2428330614458424Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification technology is one of the most widely used basic Internet of Things technologies.Because of its fast reading,high reliability,and low manufacturing cost,it is widely used in many fields,so the safety of the radio frequency identification system directly determines the security of Io T applications.The main security problems of the radio frequency identification system are as follows:(1)The available resources of the radio frequency identification system are limited,so the encryption method cannot be too complicated.(2)The radio frequency identification system uses wireless communication to achieve data exchange,and the communication process is vulnerable to interference and attacks.The main methods to solve the above two problems are encryption algorithms and authentication protocols,but traditional encryption algorithms and authentication protocols cannot be directly applied to resource-limited radio frequency identification systems,so the encryption algorithms and authentication protocols need to be lightened.This thesis analyzes the security problems and solutions of the radio frequency identification system and studies the light-weighting of encryption algorithms and authentication protocols based on encryption algorithms when system resources are limited.The specific research work of this thesis is as follows:1.Because of the limited resources in the RFID system,to meet the requirements of the algorithm on the hardware scale and software efficiency,the sponge structure and the lightweight block cipher algorithm SPECK algorithm are used to design a lightweight hash function.The security analysis results show that the hash function designed in this thesis has good dependence and collision resistance,and can meet the security requirements of resource-limited radio frequency identification systems.The result of resource cost analysis shows that the hardware scale of the designed hash function is 1232 gates,which is lower than the requirement of 2000 gates for low-cost implementation and close to the requirement of 1000 gates for ultra-lightweight implementation.The hash function designed in this thesis has a smaller hardware size and a higher quality factor and has also improved the efficiency of software implementation.2.Analyze the common authentication protocol based on the hash function in the RFID system.To solve the problem of security and effectiveness of the protocol,this thesis proposes an improved protocol of bidirectional authentication based on the hash function.Based on the self-updating mechanism of the message,the security of the protocol is improved,and the strategy of retrieval and authentication is used to improve the efficiency of the authentication process.Modeling and simulation experiment analysis of the protocol,the analysis results show that the authentication protocol designed in this thesis can resist most types of attacks against the radio frequency identification system,and can ensure the consistency of the information in the radio frequency identification system,improving the implementation of the authentication process effectiveness.The protocol designed in this thesis has lower resource consumption and higher execution efficiency,which meets the requirements of the lightweight authentication association in terms of security and performance.
Keywords/Search Tags:RFID, IoT, lightweight, hash function, authentication protocol
PDF Full Text Request
Related items