Font Size: a A A

The Research And Design Of Lightweight Security Protocol For RFID In Electric Power Dispatching Automation System

Posted on:2019-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:S Q LvFull Text:PDF
GTID:2322330545455775Subject:Mechanical engineering
Abstract/Summary:PDF Full Text Request
Radio frequency identification(RFID)system has been widely used in electric power,logistics,medical and other areas of the multiple relationship between the people’s livelihood because of its advantages,but its transmission in the wireless channel is facing security threats.At the same time,the fact that the passive tag has a low memory capacity and a low computing power,led to the result that how to solve the problem of privacy and security had been the key to limit the application of the low-cost RFID system more widely.This paper focuses on the security problems of the certification protocol between the tag and the reader in the RFID system that used in electric power dispatching automation system.Based on the in-depth analysis summarized all kinds of typical protocols,this article proposes two lightweight RFID security authentication protocol.The main contributions of this article are summarized as follows:l)The desynchronization attack methods of the lightweight security protocols is studied,and a simulated attack is made to the security protocol of the comparative literature,and then an anti-desynchronization lightweight RPID security protocol based on the time factor is put forward.This protocol can guarantee that the messages are fresh and non-repeatable based on the time factor t that updates immediately with the interactive message,in order to make the authentication between the tag the database,and gives a summarize and analysis about the security of the protocol from the view of safety analysis.2)The defects of security protocols is studied,and a lightweight RPID security authentication protocol based on the Present algorithm is proposed.This protocol encrypts the communication message by the Present algorithm and the two-way random number as the fresh number that generates at the different authentication steps to compute the encryption for mutual authentication labels and database,and gives a summarize and analysis about the security of the protocol from the view of safety analysis.3)The proof methods of security protocols and the experimental simulation are studied.And BAN logic security verification is performed on the two designed security protocols.The formal security proof of them is made through the five process,that are protocol description,protocol idealistic,protocol initialization assumption,protocol target and proof of logic,which prove them safety and reliability of the security protocols in theory;a simulation experiment about the algorithm implementation process at both the tag and reader side through the software are made,and the experiment verifies that the designed protocols are feasible.
Keywords/Search Tags:RFID, lightweight security protocol, desynchronization, Present algorithm, BAN logic
PDF Full Text Request
Related items