Font Size: a A A

Research On RFID Encryption Technology And Authentication Protocol For Internet Of Things Based On ECC

Posted on:2022-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y ZhangFull Text:PDF
GTID:2518306545950699Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years,countries have vigorously promoted the development of the Internet of Things in combination with their national conditions.China also attaches great importance to the research and development of the Internet of Things.The Internet of Things industry maintains rapid growth and its penetration rate continues to increase.At the same time,due to the characteristics of openness,extensibility and limited resources,data privacy and security of the Internet of Things are more prominent.Radio Frequency Identificaton(RFID)is a key technology for the sensing layer of the Internet of Things to automatically identify and collect target object data.RFID systems are mostly transmitted in open wireless networks,making the transmitted data easy to be intercepted and cracked,which is a weak link to ensure the security of the Io T.Therefore,a set of reliable security scheme is urgently needed to ensure the security of its information collection and transmission.Existing RFID security schemes are mainly divided into two categories: hardware security policy based on physical technology and security protocol based on encryption algorithm.Hardware security policy only provides simple information protection,poor scalability,mainly for devices or disposable electronic tags that are not suitable for password operation.On the contrary,the security protocol based on encryption algorithm is more flexible and more secure,which has become the best solution to the current RFID system security problems.Low-cost tags have limited storage and processing capacity,and it is not feasible to use computation-intensive encryption algorithms for privacy and security.Therefore,RFID system authentication protocols should not only be designed to address privacy and security threats,but also take into account the limited computing power of RFID tags.Elliptic Curve Cryptography(ECC)is a public key encryption system with both high security and lightweight characteristics.Therefore,it is feasible to improve its lightweight to adapt to RFID system to solve this problem.This paper focuses on the lightweight encryption technology of RFID system and the design of mutual authentication protocol.The research contents and specific innovations are as follows:(1)Elliptic curve encryption algorithm and its lightweightThe security problems of the RFID system of the Internet of Things were investigated and analyzed,and it was found that the security and applicability of the existing data encryption algorithm in the RFID system of the Internet of Things were unbalanced.Therefore,ECC was selected for lightweight improvement to adapt to the RFID system.Scalar multiplication is the most time-consuming part of ECC,so ECC scalar multiplication is optimized and improved to reduce ECC execution time.Based on the study of Parallel Scalar Multiplication,the Complementary Recoding Technique(CRT)and Parallel ECC Scalar Multiplication based on CRT(PECC-CRT)were improved by combining the multi-bit generation algorithm of non-adjacent Form(NAF)and the fast calculation formula of quadruple point for direct calculation of 4P.A new Parallel Scalar Multiplication Based on NAF(PSM-NAF)is designed to solve the contradiction between RIFD system hardware resource limitation and high security requirements.Experimental results show that the proposed algorithm is more suitable for resource-constrained RFID systems than other algorithms in computational efficiency and security.(2)Design of RFID mutual authentication protocol based on improved ECCThis paper designs RFID authentication protocol based on ECC,which has excellent encryption security and performance.In the process of protocol design,both protocol security and protocol execution efficiency are considered.The ECC used in the protocol is optimized by scalar multiplication and combined with the Hash function to further improve the performance of the protocol.The security of the proposed protocol is verified by BAN(Burrows-Abadai-Needham,BAN)logic,and the security analysis shows that the proposed system can resist various common attacks.And the performance analysis of the protocol shows that the computation,storage and communication overhead are reduced,and the efficiency of protocol execution is improved.
Keywords/Search Tags:Radio Frequency Identification(RFID), Elliptic Curve Cryptography, Scalar Multiplication Algorithm, Security Protocol, Mutual Authentication
PDF Full Text Request
Related items