Font Size: a A A

Research On RFID Tag Ownership Transfer Protocol In The Internet Of Things

Posted on:2022-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:Z J DongFull Text:PDF
GTID:2518306605971619Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
In recent years,the Internet of Things technology has continued to develop,and RFID(Radio Frequency Identification)as a key technology of the perception layer of the Internet of Things has attracted the attention of scholars at home and abroad.The front end of the RFID system is based on an open wireless communication environment,which enables the eavesdropping,tracking,replay,and denial of service attacks that exist in the wireless channel to be implemented in the RFID system,thereby causing security and privacy leaks.In the supply chain environment,items carrying tags have to change hands many times,and only the change of ownership of items is incomplete.the ownership of the tags also needs to be transferred.The RFID tag ownership transfer protocol is based on a cryptographic mechanism,which can effectively solve the security and ownership transfer problems of the RFID system,and has been extensively studied.The methods used in the current literature on RFID tag ownership transfer protocols can be divided into two categories according to whether TTP(Trusted Third Part)is used: centralized method,which requires TTP to transfer keys between the old and new owners;The two-party transfer method does not rely on TTP,and only relies on the old and new owners to realize the transfer of ownership.Based on this,this thesis conducts a detailed study on the tag ownership transfer protocol in the Internet of Things.The main research contents are as follows:(1)First introduced the composition and working principle of the RFID system,studied the security and privacy requirements and existing problems of the RFID system,and introduced the commonly used physical mechanisms and cryptographic schemes to solve these problems.Mainly explored the RFID tag ownership transfer protocol based on cryptography.According to the two types of TTP-based and TTP-free,a detail security analysis of several ownership transfer protocols has been carried out,and the security vulnerabilities of these protocols are pointed out.In addition,the protocol security verification method is introduced,which laid the foundation for following research on the ownership transfer protocol.(2)A TTP-based ownership transfer scheme OTODP is proposed,in which,in order to resist a secret disclosure attack—Tango attack,a lightweight block rearrangement operation is designed to encrypt information.This operation is a combination of simple bit operations.It not only has the characteristics of light weight,but also takes into account good irreversibility.In addition,this protocol also adds the ownership delegation feature to meet some special ownership transfers.The formal method is used to verify the security of the protocol.Compared with other protocols,it shows that the proposed protocol can resist various attacks,has higher security,and can be applied to low-cost tags.(3)A two-party ownership transfer protocol LTP-OTP that does not rely on TTP is proposed.This protocol uses the idea of separating authentication and ownership transfer keys to realize the transfer of tag ownership,and avoids the window problem.The formal method GNY logic proves that the protocol is secure,Compared with other two-party ownership transfer protocols in terms of security and tag computing resource requirements,this protocol has more advantages in terms of security and hardware computing loss.Finally,this thesis uses Java language to simulate the protocol process based on the Spring Boot framework for LTP-OTP,and proves the feasibility of the protocol to be implemented at the software application level.
Keywords/Search Tags:RFID, Ownership transfer, Lightweight, TTP, Internet of Things, GNY logic
PDF Full Text Request
Related items