Font Size: a A A

Research On RFID Security Authentication Protocol Based On Physical Uncloning Technology

Posted on:2021-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:X ChenFull Text:PDF
GTID:2428330614966020Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Radio frequency identification(Radio Frequency Identification,short for RFID)technology is an automatic identification technology that achieves the identity of both parties through contactless communication between the communicating parties,and has been applied to all aspects of social life so far,such as access control systems,warehouse management,livestock management,etc.At the same time,the security risks of RFID technology have also emerged.Because the communication between the reader and the tag in the RFID system is a wireless communication channel,attacker can attack the wireless communication channel to attack the RFID system,such as replication attacks and desynchronization attacks.This has hindered the development of RFID technology.This thesis studies and analyzes the existing RFID security authentication protocols,and proposes a new RFID security authentication protocol for the respective characteristics and use scenarios of RFID systems based on passive tags and active tags.The main research contents are as follows:(1)A lightweight security authentication protocol for RFID systems is proposed.For the RFID system,considering that the passive tags used are limited by hardware,here the physical non-clonable function(Physical Unclonable Function,short for PUF)and lightweight cryptography technology are combined.PUF technology will output unique and random response characteristics responses to similar input.A lightweight RFID security authentication has been proposed in Chapter 3.The protocol consists of an initialization phase,a mutual authentication phase,and a key update phase.In the initialization phase of the protocol,a group response incentive pair is first obtained for tag acquisition and stored by the background database for subsequent authentication.In addition,the key will be updated after the end of each round of authentication for the next round of authentication.At the same time,the security analysis and performance analysis prove that this protocol can resist common attacks.(2)A security authentication protocol for high-security RFID systems is proposed.Aiming at the high-security RFID system,considering the characteristics of cloud database and active tags,this thesis proposes a security authentication protocol for high-security RFID system based on physical unclonable technology and AES encryption algorithm.The protocol consists of an initialization phase,a cloud database authentication phase,a reader authentication phase,and a tag authentication phase.The protocol uses AES encryption algorithm between the reader and the cloud database to encrypt the authentication information,and uses a one-way hash function and PUF technology to encrypt authentication information between the reader and the tag.Finally,the security and reliability of this protocol are proved by security analysis and performance analysis.(3)BAN logic formal analysis has been used to derive and prove the correctness of the protocol studied in Chapter 5.In Chapters 3 and 4,the reliability and security of the proposed protocol have been demonstrated through security analysis and performance analysis.In Chapter 5,the correctness of the agreement will be derived and proved.Through the formal analysis of the BAN logic,the protocols described in Chapters 3 and 4 are described.The formalization of the protocols,the initialization of the protocols,and the proof of security objectives prove that the proposed protocols are correct.
Keywords/Search Tags:Radio Frequency Identification, Physical Unclonable, AES Encryption Algorithm, BAN Logic Proof
PDF Full Text Request
Related items