当前位置:主页 > 管理论文 > 物流管理论文 >

基于ECC的RFID双向认证协议

发布时间:2018-05-25 23:38

  本文选题:RFID + 安全协议 ; 参考:《长沙理工大学》2015年硕士论文


【摘要】:无线射频识别(Radio Frequency Identification,RFID)拥有自动识别物体、快速扫描、识别距离长、安全性高和环境适应能力强等特点,目前被广泛应用于交通、医疗、身份识别、物流和食品溯源等各大领域,已经成为我们日常生活中的重要一环。同时,它自身所存在的安全隐患也愈加突出,这样一来设计安全高效的认证非常有必要。RFID系统通过阅读器(Reader)与标签(Tag)之间的通信信息来实现对对方的认证,由于阅读器与标签之间的通信是在无线信道中进行的,在这样一个完全开放的网络中使得攻击者有机会对交互信息进行窃听、篡改和截获等攻击,导致阅读器与标签之间无法正常验证对方是否为合法身份,从而破坏系统的正常运行、窃取标签用户的隐私信息获取非法利益的目的。本文首先对基于hash函数、共享密钥以及对称密钥认证协议的介绍与分析,并指出了非公钥密码算法在安全上的不足之处。从而引出了基于椭圆曲线密码(ECC)的RFID认证协议。通过对Schnorr、Okamato以及EC-RAC安全协议这些具有代表性的基于椭圆曲线离散对数问题(ECDLP)的RFID协议进行分析和总结,提出了新的的基于ECC的RFID双向认证协议,协议使用随机数发生器、hash运算和异或运算等方式对阅读器与标签之间的通信信息进行加密处理。通过结合Diffie-Hellman密钥交换协议提出了一种新的基于ECC的RFID双向认证协议,即以ECC技术为基础进行密钥交换,确保交互信息的安全。并且在每次认证工程中,阅读器与标签的交互信息都是变化的,使攻击者难以对标签的位置进行锁定,而且每轮认证成功后将会更新随机数,确保下次会话的安全。最后通过分析其安全性,结果表明新协议具有良好的前向安全性,并且可以抵挡跟踪攻击、重放攻击、中间人攻击、标签伪装攻击、拒绝服务攻击等常见攻击能够实现阅读器与标签的双向认证,保证了用户的隐私安全,满足RFID系统的基本要求。
[Abstract]:Radio Frequency Identification (RFID) has the characteristics of automatic object identification, fast scanning, long identification distance, high security and strong adaptability to the environment. At present, it is widely used in various fields such as transportation, medical treatment, identification, logistics and food traceability. Has become an important part of our daily life. At the same time, its own security hidden danger has become increasingly prominent, so it is very necessary to design a secure and efficient authentication. RFID system can authenticate each other through the communication information between reader and tag. Since the communication between readers and tags takes place in wireless channels, in such a completely open network, attackers have the opportunity to eavesdrop, tamper and intercept interactive information. As a result, the reader and the tag can not normally verify the other person's legal identity, thus destroying the normal operation of the system and stealing the privacy information of the tag user for the purpose of obtaining illegal benefits. This paper first introduces and analyzes the hash function, shared key and symmetric key authentication protocol, and points out the shortcomings of the non-public key cryptographic algorithm in security. The RFID authentication protocol based on ECC is introduced. Based on the analysis and summary of Schnorrn Okamato and EC-RAC security protocols, which are representative RFID protocols based on elliptic curve discrete logarithm problem, a new RFID bidirectional authentication protocol based on ECC is proposed. The protocol uses random number generator hash operation and XOR operation to encrypt the communication information between reader and tag. A new RFID bidirectional authentication protocol based on ECC is proposed by combining with Diffie-Hellman key exchange protocol, that is, key exchange based on ECC technology to ensure the security of interactive information. In each authentication project, the interactive information between reader and tag is changed, which makes it difficult for the attacker to lock the location of the tag, and the random number will be updated after each successful authentication to ensure the security of the next session. Finally, by analyzing its security, the results show that the new protocol has good forward security and can resist tracking attack, replay attack, man-in-the-middle attack, label camouflage attack. Denial of service attacks and other common attacks can achieve the two-way authentication of readers and tags, ensure the privacy of users, and meet the basic requirements of RFID system.
【学位授予单位】:长沙理工大学
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:TP391.44

【参考文献】

相关期刊论文 前10条

1 冯君;汪学明;;基于超椭圆曲线密码体制的RFID安全协议[J];计算机工程与设计;2013年10期

2 张m蟦\;王斌;;基于对称密码体制的RFID安全协议[J];现代电子技术;2013年05期

3 杨超;张红旗;;基于秘密共享方案RFID认证协议[J];计算机应用;2012年12期

4 康鸿雁;;一种基于ECC的RFID双向认证协议设计[J];计算机应用与软件;2012年09期

5 王明辉;王建东;;高效的RFID双向认证协议[J];计算机应用;2011年10期

6 钟杰卓;;基于Hash链的RFID安全协议研究与设计[J];现代计算机(专业版);2010年08期

7 杨灵;陈志强;;一种低成本RFID的双向认证协议[J];计算机应用与软件;2010年08期

8 胡焰智;马大玮;田增山;李晓飞;;基于ECC的双向认证及密钥协商方案的分析与改进[J];计算机工程与设计;2009年02期

9 王春生;姚云飞;;椭圆曲线上的基的选择与实现[J];大学数学;2006年02期

10 周永彬;冯登国;;RFID安全协议的设计与分析[J];计算机学报;2006年04期



本文编号:1935092

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/wuliuguanlilunwen/1935092.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户2e482***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com