Font Size: a A A

Research On RFID Security Protocol Based On ECC

Posted on:2023-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:H W TianFull Text:PDF
GTID:2568306848466024Subject:Engineering
Abstract/Summary:PDF Full Text Request
As one of the core technologies of the sensing layer of the Internet of Things(Io T),Radio Frequency Identification(RFID)has a wide and far-reaching impact on the development of the Io T.With the continuous development of Io T and RFID,related technologies have been widely used in people’s daily life and brought great convenience.In RFID system,the electronic tag and reader communicate with each other through wireless frequency,and the communication process is carried out in the open channel exposed to the public environment,so it is easy to be attacked in practical application,which brings potential safety hazards to RFID system.In some application scenarios of RFID system,such as supply chain and logistics tracking,electronic tags are attached to items.With the continuous circulation of items,tags will be owned by different readers,and there will be security problems of privacy leakage in the process of tag ownership transfer.This paper designs a two-way authentication protocol based on elliptic curve cryptosystem to solve the above security problems,and extends the function of the protocol to support the ownership transfer of electronic tags.The main contents are as follows:(1)Based on ECC,an RFID two-way authentication protocol is designed.In the protocol,hash function operation and random generator are introduced to encrypt the communication messages in the execution process.The two-way authentication is carried out by completing the key exchange between the reader and the electronic tag.After the execution of the authentication protocol,the electronic tag will update its own identity identifier to protect the privacy of the tag.The communication messages are different and have no relevance each time the protocol is executed,It is difficult for attackers to track electronic tags or readers by intercepting communication information.The security of the protocol can be proved through the formal analysis of BAN logic.After further analysis,the protocol can resist common communication attacks.Compared with four authentication protocols of the same type,this protocol has lower computing and communication overhead.(2)Based on the label ownership problem,a label ownership transfer privacy model is described,and a label ownership transfer protocol is given by extending the two-way authentication protocol proposed above.This protocol uses the two-way authentication protocol based on ECC to complete the authentication between the label and its original owner,and transfers the label information based on elliptic curve encryption and hash function operation.Finally,it updates the information related to the ownership of the electronic label,so as to realize the transfer of label ownership.Through the analysis of label ownership transfer model,it can be seen that the protocol has forward privacy security and backward privacy security,and its security is proved by BAN logic formal analysis.And the protocol can resist common communication attacks.Compared with other similar protocols,it is found that this protocol has less computing and communication overhead.
Keywords/Search Tags:RFID, Elliptic curve cryptography, Security protocol, Anonymity, Two-way authentication, Ownership transfer
PDF Full Text Request
Related items