Font Size: a A A

Research On RFID Security Authentication Protocol Based On Random Operation

Posted on:2022-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:K F WuFull Text:PDF
GTID:2518306317457714Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID)is a technology that uses energy generated by electromagnetic induction to achieve non-contact information transmission and to identify targets.Because it can make product identification more efficient,data collection faster,anti-counterfeiting more accurate,and more convenient to operate,RFID technology has been put into use in all walks of life.However,the working environment of the RFID system is generally exposed in the public channel and is prone to various malicious attacks.Therefore,on the one hand,due to its multiple advantages,RFID technology has widely turned into public view,but on the other hand,the fact that it exposes some security risks also attracted the attention of criminals.RFID authentication protocol is a means to effectively guarantee the security of communications.In recent years,RFID authentication protocol continued to emerge,especially closer to civilian commercial lightweight protocol continuous improvement upgrades,but still can not meet the security needs of the market.Therefore,designing a more secure,reliable and low-cost RFID security authentication protocol is an important way to ensure users' communication security and protect privacy.In this paper a study for the security risks and privacy risks in the current low-cost RFID reader system and the tag communication certification process exists,the main research results obtained the following three aspects of research:1.A lightweight anonymous mutual authentication protocol based on random operators(BRO-LAMP)is proposed to implement the lightweight authentication mechanism on low-cost passive RFID tags.A new function to randomly select the operators participating in encryption is proposed:the central server maintains an operator table to store specific operators,that means all kinds of lightweight operations may appear in this table.In each round of authentication cycle,both reader and tag during authentication follow an independent sequence of operator selection.According to the index stored in the sequence,operators are selected in the operator table to participate in the current encryption operation,so as to realize the mutual authentication between reader and tag.Compared with the representative lightweight RFID authentication protocol,BRO-LAMP frees the storage space of the tag side,reduces the communication and computing overhead of the tag side.It can meet the computing and storage requirements of low-cost RFID system under resource constrained conditions,and is suitable for the identification and authentication of passive electronic tags in low-cost RFID system.2.A novel lightweight RFID authentication based on physical unclonable function(PUF)called RLMP3(lightweight mutual authentication protocol between three communication agents based on random)has been proposed.It can effectively guarantee the data privacy of the tag owner.At the same time,it can expand the scope of application of the protocol to allow the reader and server to communicate through the wireless public channel,which greatly increases the robustness of the protocol.The wireless communication process among tag,reader and server is constructed by using quadratic residual and random lightweight operation and PUF built in tag.The secure channel is avoided in the authentication process,and the two-way authentication between tag and server and between reader and server are realized respectively.Compared with the existing typical lightweight RFID authentication protocols in terms of security and performance,RLMP3 not only meets the security attributes required for communication in the public channel,but also can resist a variety of malicious attacks.It overcomes the security and privacy risks of the existing solutions without additional computing and storage costs,and is suitable for RFID systems with mobile reader devices.3.The formal authentication analysis tool BAN(burrows Abadi Needham)logic is used to set goals for the above two schemes,and the correctness of the two schemes is deduced and proved.A complete system has been designed and implemented by C++language to simulate the whole authentication process of bro-lamp protocol.The security of the two schemes is verified by AVISPA tool.Through the formal analysis,it is proved that both BRO-LAMP and RLMP3 can guarantee the confidentiality and integrity of data transferring in public channel or storing locally.They can satisfy the security attributes such as mutual authentication and also resist various malicious attacks faced by the RFID system.
Keywords/Search Tags:Radio frequency identification(RFID), Internet of things(IoT), Lightweight, Authentication protocol, Physical unclonable function(PUF)
PDF Full Text Request
Related items