Font Size: a A A

Research On Strong Anonymous RFID Authentication Protocol Based On Hash Function And Dynamic Shared Key

Posted on:2018-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:G B HuFull Text:PDF
GTID:2348330515996677Subject:Engineering
Abstract/Summary:PDF Full Text Request
RFID is a non-contact automatic identification system that uses low-cost electronic tags to mark objects.RFID technology has the advantage of simultaneously identifying large amounts of information and is gradually replacing bar code systems.As one of the key technologies of Internet of Things,RFID technology has a wide range of application prospects,researchers pay more attention to it in recent years.because of the special physical characteristics of the RFID system,making it face a lot of security issues.As RFID systems are widely used,and in the case of limited computing and storage capacity,how to design a low complexity and also protect the privacy of users of lightweight RFID authentication protocol has become the most important research.This paper first introduces the RFID security requirements of RFID system,and expatiates the existing RFID authentication protocol according to the different encryption methods.In order to make full use of reader computing and storage capacity and reduce the burden on the server,we have a detailed analysis of reader filter mechanism.In this paper,we revised the Index Inner Table used in RFID reader.Proposed a filter mechanism for the strong anonymous RFID authentication protocol based on the dynamic ID mechanism--dynamic filtering table.And the structure,the establishment,the execution process and the algorithm of the dynamic filtering table are designed in detail.This paper summarizes the existing lightweight RFID authentication protocols based on Hash functions.We found that most of them are easy to be tracked,revealing user’s privacy,and vulnerable to such as tag tracking and Dos attack and other types of attacks,and they did not really achieve the Tag of the strong anonymity.This paper proposes a lightweight RFID authentication protocol which truly satisfies the strong anonymity of tags,based on the hash function and the dynamic shared key mechanism.In this protocol,we applies the idea of dynamic filtering table proposed in Chapter 3,and establishes the filtering mechanism in the RFID reader.For the dynamic shared key mechanism is easy to lose synchronization problems,this paper uses the dynamic sequence to detect whether the authentication process is synchronized,in the case of loss of synchronization,we use pre-registered key-value pairs in the backup table to authenticate,which can effectively resist the De-synchronization attack and Dos attack.Then,the security and performance of the protocol are analyzed in detail,and the software simulation protocol authentication process is used.Finally,the security of the RFID protocol proposed by this paper is proved by the BAN logic formalization method.the rationality,Feasibility and security of the protocol has been proved.
Keywords/Search Tags:RFID, Hash function, Dynamic shared key, Strong anonymity, BAN logic
PDF Full Text Request
Related items