Font Size: a A A

Research On ECC-based RFID Protocols In Internet Of Things

Posted on:2021-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhaoFull Text:PDF
GTID:2518306050967969Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the development of technology,the Internet of things(Io T)has been widely used in public transportation,logistics management,book management,medical environments and other fields in recent years.Although it brings efficiency and convenience to people,its security and privacy problems cannot be underestimated.Radio frequency identification(RFID)technology is one of the core technologies in the perception layer of the Io T.It can identify specific targets and exchange relevant data by radio signals.Scholars attach great importance to RFID in order to realize RFID identity authentication and ensure the privacy of sensitive data in tag or reader.Due to the limited resources of RFID system environment,some protocols that meet the security requirements cannot adapt to such a harsh environment,and high lightweight protocols cannot guarantee the security and privacy.We propose an ECC-based RFID mutual authentication protocol which is suitable for the large-scale tag environment after studying the existing RFID protocols.And we design a RFID single tag ownership transfer protocol without a trusted third party.Specifically,the main work of this paper is as follows:(1)We construct an ECC-based RFID mutual authentication protocol according to the authentication model of RFID system and XOR operation,which realizes the mutual identity authentication between tag and reader.In this protocol,ECDSA digital signature mechanism is used instead of the key searching mechanism in the traditional protocol.The tag is verified by the consistency comparison between the signature verification result and the temporary key decryption result,which reduces the step of the linear searching in the background database and improves the efficiency of the protocol.It is suitable for mobile reader environment with high flexibility and good scalability.And we give the security analysis and experimental simulation,which shows that this protocol can guarantee forward privacy security.And it can resist malicious attacks such as replay attack and masquerade attack.At the same time,compared with other similar protocols,the storage requirements of readers in our protocol are constant,and the tag has less storage requirements and less computing complexity.(2)The second protocol is an extended solution on the basis of the first one.An ECC-based RFID tag ownership transfer is proposed considering the change of ownership in the tag life cycle.After the mutual authentication between the original owner and the target tag is completed,the ownership information of the tag is transferred to the new owner through the ownership transfer protocol,and then the privacy content between the new owner and the target tag needs to updated synchronously through the key update protocol,which can realize the ownership transfer function.The protocol does not need a trusted third party to transfer tag ownership from an original owner to a new one.The key can be updated through the communication among the three parties,and the communication steps can be reduced.And we give the security analysis and experimental simulation,which shows that this protocol can guarantee forward privacy security and backward privacy security under the security model described in this paper.And it can resist malicious attacks such as mid-in-middle attack and desynchronization attack.At the same time,compared with other similar protocols,the tag has less storage requirements and less computing complexity.
Keywords/Search Tags:RFID, elliptic curve, signature, scalability, forward privacy
PDF Full Text Request
Related items