Font Size: a A A

Design And Hardware Simulation Of ECC Based Low Cost RFID Authentication Protocol

Posted on:2022-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:C YangFull Text:PDF
GTID:2518306605490344Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification)is a non-contact item identification technology that can identify targets at a long distance.It has been successfully applied in the fields of food safety,warehouse management,intelligent transportation,telemedicine,and supply chain management.However,the RFID system is vulnerable to various attacks due to the openness of the link between the reader and the electronic tag,such as: location privacy leakage,"monitoring",deception,tampering,etc.Moreover,most tags of the RFID system are passive,which makes the cost of the electronic tag too high if the hardware consumption is too large.Therefore,it is of great significance to study how to ensure the security of the RFID system while reducing the cost of the RFID system.At present,domestic and foreign scholars have proposed many kinds of RFID system security authentication protocols.Among them,some are based on symmetric key technology,some are based on hash function,and some are based on public key cryptography.Although the symmetric key-based RFID authentication protocol has low computational complexity,the key management is inconvenient,which will also affect the large-scale deployment of RFID.The public keybased RFID authentication protocol overcomes this shortcoming and also has certain advantages in security.Therefore,the public key-based RFID authentication protocol has become a hot topic for domestic and foreign scholars in recent years.However,most protocols do not consider the cost of electronic tags.The vast majority of electronic tags have no power supply,and the amount of storage and calculation they can carry is very limited,and they cannot support complex public key cryptographic algorithms.Therefore,this article focuses on the public key-based RFID authentication technology,and studies how to reduce the cost of tags under the premise of ensuring security,and has achieved the following results:First of all,this thesis designs an authentication protocol based on elliptic curve cryptography,which adopts the method of entrusted storage of random parameters,and passes the point multiplication operation of the random parameters that need to be processed in the authentication process through a trusted third party pre-calculation,and calculates The result is encrypted and entrusted to the back-end database for storage;the random number used in the scheme is generated cyclically based on a lightweight hash function.After the two-way authentication between the reader and the tag,the reader will retrieve the encrypted random parameters that are entrusted to be stored from the back-end database and send them to the electronic tag to update the parameters.The electronic tag avoids updating its own random parameters through the dot multiplication operation.The calculation complexity of the tag and the hardware consumption cost are reduced,is.Then use BAN logic and AVISPA tools to prove and test the security of the protocol,and then compare this protocol with similar protocols in terms of storage capacity and calculation cost.The results show that the protocol in this thesis is safe and effective.Secondly,a group tag authentication protocol is designed,and the two-way authentication between the reader and the group tag is completed using a method similar to that in Chapter 3.Use BAN logic and AVISPA tools to analyze the security and performance of the protocol,and compare it with similar protocols in terms of storage capacity and computational cost,and the results are good.The results show that the protocol in this thesis is also safe and effective.Finally,the hardware analysis of the hash calculation involved in the electronic tag in the authentication process was done,and the multiplier used by Vivado is simulated.The results show that the proposed protocol can meet the requirements of low cost.
Keywords/Search Tags:Random parameters, Delegate storage, ECC, RFID
PDF Full Text Request
Related items