Font Size: a A A

Research On Cloud Service RFID System Authentication Protocol Using PUF

Posted on:2022-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:Q YeFull Text:PDF
GTID:2518306527978799Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency Identification(RFID),as a kind of information interaction technology using Radio Frequency signals,effectively realizes the non-contact Identification between objects in the short distance communication technology,has been widely used in intelligent storage,intelligent driving,security and military and other frontier fields.At the same time,RFID system has been widely used,security and privacy,reader mobility and other issues have also been concerned.Faced with these problems,researchers at home and abroad devote themselves to propose an effective RFID security authentication protocol to improve the security performance and application scenarios of RFID system.Therefore,this paper carries out a series of studies on the security authentication protocol of the RFID system with low cost and large scale tags.The main work is as follows.(1)(1)Study on the physical unclonable function(PUF)of the oscillating ring which extracts the entropy of multibit reliable information by the frequency characteristics of the oscillating ring.According to the low cost requirements of RFID tags,the research of a PUF that generates multi-bit stable information entropy can further reduce the hardware resources consumed by tags.Extract more reliable information Entropy of turbulence Ring physical not cloning function(ME-ROPUF)based on FPGA in the Ring Oscillator frequency data generated by the analysis of the methods of extracting the information Entropy change PUF,extracted from each shock Ring to represent the characteristics of the shock Ring features as information Entropy,so as to improve the information Entropy of PUF can produce quantity;By studying the temperature characteristics of the inverter,the current starvation inverter and the conventional inverter are used to form a new oscillation ring to reduce the influence of temperature on PUF reliability.(2)Research on PUF-based RFID security authentication protocol for cloud services.In view of the problem that the traditional encryption method consumes a lot of resources in the RFID authentication process,PUF is adopted as the main encryption method in the authentication process.As the RFID system based on back-end server is not suitable for large-scale tag application scenarios,combined with cloud computing,5G and other technologies,the server side of RFID is deployed on the cloud platform to achieve the mobility of the reader,so as to achieve the applicability of the RFID system for large-scale tag scenarios.In view of the hidden security problems existing in cloud service RFID system,methods such as double index mechanism and timestamp data are adopted to ensure the security of cloud service RFID system authentication process.(3)Implement cloud service RFID security authentication protocol through NFC security authentication system.According to the designed cloud service RFID security authentication protocol,complete the design and development of NFC security authentication system,and use Android devices that support NFC function as labels and readers respectively to carry out information exchange according to the protocol.Common attack type simulation test is carried out on the designed system to verify the reliability of the NFC security authentication system and ensure that the information and privacy of the two Android devices using the NFC security authentication system will not be damaged.The results of Cadence IC simulation and experiments on the Zynq 7000 series FPGA development platform show that the ME-ROPUF scheme uses the same number of oscillating rings to generate more information entropy,and its reliability and uniqueness are improved.The rationality and security privacy protection performance of the protocol are proved by Amban logic proof and Vaudenay privacy model.The comparative analysis shows that the resource consumption and security performance of the protocol are better than that of the comparative RFID authentication protocol.Use Qt to develop the NFC security authentication system,and implement the designed cloud service RFID authentication system.
Keywords/Search Tags:radio frequency identification, Physical unclonable function, Security certification protocol, Cloud computing, NFC
PDF Full Text Request
Related items