Font Size: a A A

Research On Two RFID Authentication Schemes

Posted on:2022-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ShiFull Text:PDF
GTID:2518306776954669Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)technology is an identification technology that has developed rapidly with the development of the Internet of Things.It mainly uses radio frequency technology to realize data dissemination or reading and writing.In recent years,many lightweight RFID authentication schemes based on single-item hash functions have been proposed.However,with the development of the Internet of Things,RFID authentication schemes based on single-item hash functions cannot meet the security requirements of the current network.RFID authentication scheme of symmetric cryptosystem and public key cryptosystem.In the traditional RFID authentication scheme,the use of cloud servers is not popular,but with the rapid development of the Internet of Things,the number of users in the RFID system has increased rapidly,which has added a large amount of storage data and computing data to the traditional back-end database,which greatly increases the maintenance cost of the database.Aiming at these problems,this paper will study the RFID authentication scheme and propose two new schemes.The main research work is as follows:(1)This paper proposes a cloud server-based RFID authentication scheme.First,the solution uses cloud servers to replace the traditional back-end database to store and calculate data,thereby improving the computing efficiency of the entire solution and reducing the maintenance cost of the database.Secondly,the scheme uses an elliptic curve cryptosystem,xwhich can ensure the privacy and security of users,and can also resist various attacks against RFID systems.Finally,the security of the scheme is proved by the BAN logic theorem,and the security analysis and efficiency comparison are carried out.(2)This paper proposes an RFID authentication scheme based on RSA.First at all,this scheme uses the RSA cryptosystem,and the security of RSA depends on the fact that the large prime numbers are difficult to decompose,so the scheme has strong enough security.Secondly,the security analysis of the scheme is carried out to prove that the scheme has sufficient security to resist the attack against the RFID system.Finally,the RFID authentication scheme based on RSA has not been widely proposed,and the scheme is innovative enough.
Keywords/Search Tags:RFID, Authentication, Cloud computing, Elliptic curve, RSA, BAN logical proof
PDF Full Text Request
Related items