当前位置:主页 > 管理论文 > 供应链论文 >

物联网中的RFID安全协议与可信保障机制研究

发布时间:2018-05-04 06:12

  本文选题:RFID协议 + 安全 ; 参考:《天津大学》2014年博士论文


【摘要】:伴随着物联网技术的兴起,射频识别RFID)技术受到更为广泛的关注,但其安全特性与面临的隐私问题制约了其应用。为此学者研究了隐私模型,并从基于物理的方法、基于密码技术的方法等多角度提出解决办法,同时针对该技术的应用特点,对其面临的所有权转换问题也进行了研究。尽管基于密码技术的安全协议可提供更为灵活的方案,然而因射频标签的成本限制,一些成熟技术无法在标签中应用,这也使得解决射频识别面临的安全与隐私问题受到限制。 本文以密码技术为工具,围绕射频识别面临的安全与隐私问题,进行了三个相互关联问题的研究。 首先,在协议隐私模型与协议分析研究部分。分析了RFID标签认证协议的特点,从消息随机性的角度对诸多协议分析后,指出协议存在漏洞的重要原因。在给出的RFID协议隐私模型基础上,证明了协议中使用随机数的必要性,构造影子实验,证明了不可分辨性和不可预测性在一定条件下的一致性。进一步根据模型提出了基于消息随机性分析的协议分析方法和消息构造应注意的准则并加以实践,证明其有效性。这部分工作是协议的设计和分析的理论基础。 其次,在协议设计研究部分。1)从安全需求与成本投入的角度,对安全与攻击分别进行分级,针对不同成本的标签设计了静态ID类和动态ID类2类RFID基本协议,不仅可抵抗常见攻击,还可抵抗已有研究忽略的失窃表攻击。不同类别的协议可以防范不同级别的攻击,可供不同安全需求的场景所选用;2)针对RFID在供应链中应用时所面临的所有者变更问题,考虑运输者参与的情况,提出所有权共享概念,并在所设计的非一致共享秘密的协议构架上给出了支持协议。区别于已有研究,协议可以在出现异常时,对攻击进行逆应用来判定标签标的物的归属,同时更为灵活的支持委托授权以利于后端服务器的处理。 最后,在后端保障与追踪溯源问题研究部分。1)首先使用可信计算技术给出了RFID后端的安全保障模型,并重点针对可信链的建立,可信显示为实现追踪溯源提出了解决方案及协议,避免Privacy CA方案的瓶颈和DDA方案在追踪溯源问题上的不可确认性;2)最后给出具备隐私保护特定的追踪溯源方案的设计,可同时满足既掌握买卖双方交易情况,又满足具体交易信息隐私性的矛盾需求。 通过隐私模型以及对协议的分析研究,为协议的设计提供良好的消息构造准则基础;在可信计算保障下的后端的安全模型为协议运行提供安全的环境,同时也为最后所设计的追踪溯源方案提供可信保障。
[Abstract]:With the rise of Internet of things technology, RFID RFID (RFID) technology has been paid more and more attention, but its security characteristics and privacy problems are restricting its application. Therefore, the scholars have studied the privacy model and proposed solutions based on the physical method, the method based on cryptography, and the application of the technology. The problem of ownership conversion is also studied. Although cryptographic technology based security protocols can provide more flexible solutions, some mature technologies cannot be used in labels due to the cost constraints of RFID tags, which also limits the security and privacy issues facing RFID.
In this paper, cryptography is used as a tool to study the three issues of interrelated problems surrounding the security and privacy issues faced by RFID.
Firstly, in the research part of protocol privacy model and protocol analysis, the characteristics of RFID tag authentication protocol are analyzed. After analyzing many protocols from the perspective of message randomness, the important reasons for the existence of the protocol are pointed out. On the basis of the RFID protocol privacy model given, the necessity of using random numbers in the proposed agreement is proved and the shadow experiment is constructed. The consistency of undiscernibility and unpredictability under certain conditions is proved. According to the model, the protocol analysis method based on message randomness analysis and the rules should be paid attention to and practice to prove its validity. This part of the work is the theoretical basis of the design and analysis of the protocol.
Secondly, in the research part of the protocol design research part (.1), the security and attack are classified separately from the point of view of security requirements and cost input. 2 classes of static ID class and dynamic ID class RFID basic protocols are designed for different cost tags, not only to resist common attacks, but also to resist stolen table attacks that have been neglected. Different types of protocols can be used. In order to prevent different levels of attack, it can be selected for different security requirements; 2) in view of the owners' change problem in the application of RFID in the supply chain, the concept of ownership sharing is proposed considering the carrier participation, and the support protocol is given on the designed non consistent shared secret protocol framework. In the case of an exception, the protocol can be used to determine the attribution of the tag object and to support the Delegation Authorization more flexibly for the processing of the back end server when the exception occurs.
Finally, in the research part of rear end guarantee and tracing traceability problem.1) first use trusted computing technology to give the security guarantee model of the back end of RFID, and focus on the establishment of the trusted chain, and put forward the solution and protocol to realize tracing back to the source, avoid the bottleneck of the Privacy CA scheme and the DDA scheme in tracing the source problem. In the end, the design of a specific tracing traceability scheme with privacy protection can meet the conflicting needs of both buyers and sellers and the privacy of specific transaction information at the same time. 2.
Through the analysis of the privacy model and the analysis of the protocol, it provides a good basis for the protocol design, and the security model of the back end under the trusted computing guarantee provides a safe environment for the protocol operation, and also provides a reliable guarantee for the last designed tracing traceability scheme.

【学位授予单位】:天津大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TP391.44;TN929.5

【参考文献】

相关期刊论文 前7条

1 王震宇;刘鑫杰;任杰;刘海雷;吴杰;;嵌入式终端可信计算环境的关键技术[J];计算机工程;2008年22期

2 周永彬;冯登国;;RFID安全协议的设计与分析[J];计算机学报;2006年04期

3 徐明迪;张焕国;赵恒;李峻林;严飞;;可信计算平台信任链安全性分析[J];计算机学报;2010年07期

4 马昌社;;前向隐私安全的低成本RFID认证协议[J];计算机学报;2011年08期

5 张策;崔刚;傅忠传;;TCG下可信度量机制与模型分析[J];哈尔滨工业大学学报;2013年01期

6 李福林;李立新;周雁舟;徐宁;;基于可信计算平台的统一认证系统模型[J];武汉大学学报(理学版);2009年01期

7 锁琰;徐小岩;张毓森;张涛;桂荆京;杨莉;乐康;;支持组件动态更新的远程证明[J];西安电子科技大学学报;2011年04期



本文编号:1841913

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/gongyinglianguanli/1841913.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户94a71***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com