Font Size: a A A

Research On RFID System Security Authentication Protocol In The Internet Of Things

Posted on:2022-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y B LuFull Text:PDF
GTID:2518306605471624Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Radio Frequency identification(RFID)is one of the important technologies of the Internet of Things,and it is widely used in the fields of urban public safety,modern smart home,smart transportation,agricultural environment monitoring and so on.The wireless communication method in the RFID system makes the RFID system face many security threats such as channel eavesdropping,tag or reader forgery,tag tracking,replaying information,information tampering,and desynchronization attacks.Due to resource constraints,traditional encryption algorithms and authentication protocols cannot be directly applied to RFID systems.Therefore,explore the practical application of lightweight and ultra-lightweight authentication protocols and secure encryption algorithms for low-cost RFID systems to RFID technology.Application has important meaning.In recent years,researchers have proposed a series of ultra-lightweight or lightweight RFID security protocols for information security encryption and identity security identification in passive RFID systems with limited resources.However,these security protocols still have some security loopholes,so research The development of new and more secure and reliable lightweight Io T security protocols has important value and significance in practical applications.Aiming at the traditional back-end server RFID system and the cloud serverbased RFID system,this article conducts research on the ultra-lightweight or lightweight authentication protocol among them.The main work is as follows:First of all,this article introduces the RFID related knowledge in the Internet of Things system,including the composition of the RFID system,the working principle of the RFID system,the security threats of the RFID system and the authentication protocol used in the RFID system.Secondly,on the basis of studying the security of the classic RFID ultra-lightweight authentication protocol-TGAP protocol,this article improves it and proposes the ATGAP protocol.The improved protocol can effectively resist information replay,man-in-themiddle,desynchronization,and tagging.Tracking and other attacks.Secondly,based on the characteristics of low-cost passive RFID systems,a safe and efficient authentication protocol,URAP,is proposed and the GNY logic proof method is used to analyze the security feasibility of the protocol.The analysis results show that the proposed protocol can resist a variety of common attacks.Compared with ultra-lightweight RFID security protocols such as MMAP,LMAP,EAMP,SASI,RAPP,TGAP,etc.,URAP is superior to existing ultralightweight protocols in terms of computational cost and communication overhead,and has more practical value.In addition,a protocol simulation platform was built,and the Java programming language was used to perform software simulation on the proposed URAP protocol,which further verified the effectiveness of the protocol.Finally,in the face of the characteristics of massive data in the Internet of Things,this article uses a cloud server to replace the traditional back-end server,which greatly improves the data processing capability of the RFID system.Aiming at the RFID system based on cloud server,a lightweight identity authentication protocol is designed to solve its security problem.This protocol can realize mutual authentication between cloud server,reader and tag.Through performance analysis and GNY logic proof,it can be concluded that the proposed protocol can meet confidentiality,integrity,forward security and tag anonymity,etc.Security requirements,and can resist information replay,desynchronization,and man-in-the-middle attacks,with high security.Software simulation results show that the proposed protocol can meet the application requirements of RFID under the cloud platform and has a wide range of application scenarios.
Keywords/Search Tags:Internet of Things, radio frequency identification, ultra-lightweight, security authentication protocol
PDF Full Text Request
Related items