Font Size: a A A

Research On Security Of Ultra Lightweight RFID Authentication Protocol

Posted on:2021-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:C C LiFull Text:PDF
GTID:2428330614965838Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rise of smart homes,the Internet of Things is gradually well known to the public,and it will continue to trigger a new round of technological change together with technologies such as artificial intelligence,cloud computing,and big data.As the most basic version of the current Internet of Things data collection,RFID technology is widely used in various scenarios because of its low cost,small size,and high efficiency.Because of this,the security of the RFID system will directly determine whether the collected information is credible,thus affecting the stability of the upper layer of the Internet of Things.At present,due to the limitation of tag storage and computing capabilities,research on RFID authentication protocols has basically focused on ultra-lightweight authentication.The calculation methods involved in such authentication protocols are relatively simple,which is helpful to reduce the calculation cost of authentication,but also faces various types of Security issues: 1.It is vulnerable to interception,theft and other attack methods that are not easily detectable by users to collect and organize information,and even crack confidential information;2.Illegal attackers masquerade as readers,generate fake data streams,and use deception,Camouflage and other attack methods to obtain information.3.The middleman eavesdrops on the communication of the tag and reader to tamper with the information and then sends it to the other party to achieve the purpose of illegal authentication.So how to design an efficient and secure RFID password system in a resource-constrained environment is one of the issues that academia and industry focus on.This article focuses on in-depth research on the HB protocol family and UMAP protocol family,finds potential problems in the protocol,and proposes new solutions.The main research results are as follows:(1)Researched and analyzed the representative HB authentication protocols and HB + authentication protocols in the HB protocol family,and the analysis results pointed out that these two protocols have the following problems: they cannot guarantee that 100% of legitimate users pass the authentication;the protocols need to be implemented Multiple rounds of single-round authentication,resulting in too much protocol communication volume;the tag repeatedly calls the random number generation algorithm to occupy a large amount of computing resources.Based on the above problems,this paper proposes M-HB and M-HB + protocols,respectively.The new protocol can guarantee that 100% of legitimate users pass the authentication.At the same time,the new scheme has higher security and less communication volume than the original scheme.In the extended discussion,the label does not need to call the random number generation function from the second round,and the operation efficiency is higher.(2)After researching and analyzing typical SASI-RH and KMAP authentication protocols in the UMAP protocol family,we found that the recursive hash function and pseudo-Kasami code function introduced by the protocol are homomorphic and reversible.It can crack key information and no longer meet the security and privacy requirements of RFID systems.In this regard,this article proposes a new scheme based on the KMAP protocol.The new scheme can resist attackers' key recovery attacks and meet the security requirements of RFID.At the same time,it has a smaller amount of calculation than the KMAP authentication protocol.(3)Simulate the new scheme proposed in Chapter 4 from the aspects of security and efficiency,and compare it with the KMAP protocol.Experimental results show that the new scheme can ensure that legitimate users can pass the authentication normally.It is superior to the KMAP protocol in terms of calculation volume and running time,and meets the requirements of low storage and low calculation costs for RFID systems.
Keywords/Search Tags:Radio frequency identification, ultra-lightweight authentication protocol, HB protocol family, UMAP protocol family, key recovery attack
PDF Full Text Request
Related items