Font Size: a A A

Research On Ultra-lightweight RFID Authentication Protocols In IoT

Posted on:2023-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:X M WangFull Text:PDF
GTID:2558306911486454Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Things(Io T),Radio Frequency Identification(RFID)improves the quality of service worldwide in multiple industries.As a critical technology,RFID realizes the interconnection of everything,including healthcare,logistics,supply chain,military,and agriculture,and provides various security services to protect data transferred between tags and readers in Io T environments.However,the advantages of RFID can not prevent attackers from accessing this communication.If the private information of RFID system users is accidentally leaked,it will affect the system’s usability and even cause enterprises and individuals to suffer heavy losses.Coupled with the limited tag resources,the security authentication of RFID systems and the protection of confidential data have high research value.Many researchers have proposed security protocols for RFID systems based on cryptographic hash functions,symmetric cryptography,and elliptic curve cryptography.However,most protocols fail to meet RFID security requirements,and cannot be implemented on low-cost tags.To solve security and privacy problems in RFID systems,it’s hard to come up with low-cost authentication protocols that meet the needs of different applications.To solve the above problems,we propose the following two RFID ultra-lightweight authentication protocols based on the ultra-lightweight bit operation algorithm for two typical scenarios:Aiming at scattered tags and highly sensitive individual data,we propose an ultra-lightweight RFID authentication protocol based on cloud servers in the smart medical scene.RFID technology is widely used in the medical system,which significantly facilitates medical management and reduces the tag cost of medical services.However,improper use of RFID tags is highly likely to threaten the safety and privacy of hospitals and patients.However,it is also challenging to design efficient and effective authentication protocols for RFID medical monitoring systems due to the resource constraints of RFID tags and readers.To reduce resource costs,this paper proposes an ultra-lightweight RFID security authentication protocol based on the cloud server to meet the security requirements of RFID systems.This protocol is based on bit exchange XOR rearrangement,which can effectively resist usual security attack methods while authenticating cloud servers.The formal logic of BAN proves the security and feasibility of the protocol.Finally,we use the Verilog language to simulate the tag overhead of the protocol on the Vivado platform and simulate the time required for authentication.Compared with other classic RFID authentication protocols,the security analysis and experimental results show that the authentication protocol can use lower costs to achieve higher security goals.Aiming at the tags being distributed in a large number,we propose an ultra-lightweight RFID batch authentication protocol in the smart logistics scenario.Smart logistics refers to a logistics distribution network system that integrates information,intelligence,and systematization using Io T technology and information technology.RFID technology can monitor the condition of goods during transportation in real-time.The location of express goods is concentrated in most cases,and the situation of lost goods often occurs in actual logistics.Hence,a batch authentication protocol that can identify the situation of lost goods is urgently needed.Therefore,we design an RFID batch authentication protocol suitable for smart logistics based on the newly proposed ultra-lightweight encryption algorithm and the collision operation.The protocol can identify missing goods while batch-certifying legitimate goods.Meanwhile,the security analysis and comparison show that it realizes the mutual authentication of tags,readers,and cloud servers,which can effectively resist common security threats and has higher security than other batch authentication protocols.The BAN logic also formally proves the security of the protocol.Finally,the authentication process is simulated on the Vivado platform to simulate the computational overhead of the label and the IDEA editor.Compared with other protocols,the results show that this protocol achieves more efficient batch authentication with a smaller overhead.
Keywords/Search Tags:RFID, Authentication Protocol, Ultra-Lightweight, Security & Privacy, IoT
PDF Full Text Request
Related items