物聯(lián)網(wǎng)中的RFID安全協(xié)議與可信保障機(jī)制研究
本文選題:RFID協(xié)議 + 安全; 參考:《天津大學(xué)》2014年博士論文
【摘要】:伴隨著物聯(lián)網(wǎng)技術(shù)的興起,射頻識(shí)別RFID)技術(shù)受到更為廣泛的關(guān)注,但其安全特性與面臨的隱私問題制約了其應(yīng)用。為此學(xué)者研究了隱私模型,并從基于物理的方法、基于密碼技術(shù)的方法等多角度提出解決辦法,同時(shí)針對(duì)該技術(shù)的應(yīng)用特點(diǎn),對(duì)其面臨的所有權(quán)轉(zhuǎn)換問題也進(jìn)行了研究。盡管基于密碼技術(shù)的安全協(xié)議可提供更為靈活的方案,然而因射頻標(biāo)簽的成本限制,一些成熟技術(shù)無法在標(biāo)簽中應(yīng)用,這也使得解決射頻識(shí)別面臨的安全與隱私問題受到限制。 本文以密碼技術(shù)為工具,圍繞射頻識(shí)別面臨的安全與隱私問題,進(jìn)行了三個(gè)相互關(guān)聯(lián)問題的研究。 首先,在協(xié)議隱私模型與協(xié)議分析研究部分。分析了RFID標(biāo)簽認(rèn)證協(xié)議的特點(diǎn),從消息隨機(jī)性的角度對(duì)諸多協(xié)議分析后,指出協(xié)議存在漏洞的重要原因。在給出的RFID協(xié)議隱私模型基礎(chǔ)上,證明了協(xié)議中使用隨機(jī)數(shù)的必要性,構(gòu)造影子實(shí)驗(yàn),證明了不可分辨性和不可預(yù)測性在一定條件下的一致性。進(jìn)一步根據(jù)模型提出了基于消息隨機(jī)性分析的協(xié)議分析方法和消息構(gòu)造應(yīng)注意的準(zhǔn)則并加以實(shí)踐,證明其有效性。這部分工作是協(xié)議的設(shè)計(jì)和分析的理論基礎(chǔ)。 其次,在協(xié)議設(shè)計(jì)研究部分。1)從安全需求與成本投入的角度,對(duì)安全與攻擊分別進(jìn)行分級(jí),針對(duì)不同成本的標(biāo)簽設(shè)計(jì)了靜態(tài)ID類和動(dòng)態(tài)ID類2類RFID基本協(xié)議,不僅可抵抗常見攻擊,還可抵抗已有研究忽略的失竊表攻擊。不同類別的協(xié)議可以防范不同級(jí)別的攻擊,可供不同安全需求的場景所選用;2)針對(duì)RFID在供應(yīng)鏈中應(yīng)用時(shí)所面臨的所有者變更問題,考慮運(yùn)輸者參與的情況,提出所有權(quán)共享概念,并在所設(shè)計(jì)的非一致共享秘密的協(xié)議構(gòu)架上給出了支持協(xié)議。區(qū)別于已有研究,協(xié)議可以在出現(xiàn)異常時(shí),對(duì)攻擊進(jìn)行逆應(yīng)用來判定標(biāo)簽標(biāo)的物的歸屬,同時(shí)更為靈活的支持委托授權(quán)以利于后端服務(wù)器的處理。 最后,在后端保障與追蹤溯源問題研究部分。1)首先使用可信計(jì)算技術(shù)給出了RFID后端的安全保障模型,并重點(diǎn)針對(duì)可信鏈的建立,可信顯示為實(shí)現(xiàn)追蹤溯源提出了解決方案及協(xié)議,避免Privacy CA方案的瓶頸和DDA方案在追蹤溯源問題上的不可確認(rèn)性;2)最后給出具備隱私保護(hù)特定的追蹤溯源方案的設(shè)計(jì),可同時(shí)滿足既掌握買賣雙方交易情況,又滿足具體交易信息隱私性的矛盾需求。 通過隱私模型以及對(duì)協(xié)議的分析研究,為協(xié)議的設(shè)計(jì)提供良好的消息構(gòu)造準(zhǔn)則基礎(chǔ);在可信計(jì)算保障下的后端的安全模型為協(xié)議運(yùn)行提供安全的環(huán)境,同時(shí)也為最后所設(shè)計(jì)的追蹤溯源方案提供可信保障。
[Abstract]:With the rise of Internet of things technology, RFID RFID (RFID) technology has been paid more and more attention, but its security characteristics and privacy problems are restricting its application. Therefore, the scholars have studied the privacy model and proposed solutions based on the physical method, the method based on cryptography, and the application of the technology. The problem of ownership conversion is also studied. Although cryptographic technology based security protocols can provide more flexible solutions, some mature technologies cannot be used in labels due to the cost constraints of RFID tags, which also limits the security and privacy issues facing RFID.
In this paper, cryptography is used as a tool to study the three issues of interrelated problems surrounding the security and privacy issues faced by RFID.
Firstly, in the research part of protocol privacy model and protocol analysis, the characteristics of RFID tag authentication protocol are analyzed. After analyzing many protocols from the perspective of message randomness, the important reasons for the existence of the protocol are pointed out. On the basis of the RFID protocol privacy model given, the necessity of using random numbers in the proposed agreement is proved and the shadow experiment is constructed. The consistency of undiscernibility and unpredictability under certain conditions is proved. According to the model, the protocol analysis method based on message randomness analysis and the rules should be paid attention to and practice to prove its validity. This part of the work is the theoretical basis of the design and analysis of the protocol.
Secondly, in the research part of the protocol design research part (.1), the security and attack are classified separately from the point of view of security requirements and cost input. 2 classes of static ID class and dynamic ID class RFID basic protocols are designed for different cost tags, not only to resist common attacks, but also to resist stolen table attacks that have been neglected. Different types of protocols can be used. In order to prevent different levels of attack, it can be selected for different security requirements; 2) in view of the owners' change problem in the application of RFID in the supply chain, the concept of ownership sharing is proposed considering the carrier participation, and the support protocol is given on the designed non consistent shared secret protocol framework. In the case of an exception, the protocol can be used to determine the attribution of the tag object and to support the Delegation Authorization more flexibly for the processing of the back end server when the exception occurs.
Finally, in the research part of rear end guarantee and tracing traceability problem.1) first use trusted computing technology to give the security guarantee model of the back end of RFID, and focus on the establishment of the trusted chain, and put forward the solution and protocol to realize tracing back to the source, avoid the bottleneck of the Privacy CA scheme and the DDA scheme in tracing the source problem. In the end, the design of a specific tracing traceability scheme with privacy protection can meet the conflicting needs of both buyers and sellers and the privacy of specific transaction information at the same time. 2.
Through the analysis of the privacy model and the analysis of the protocol, it provides a good basis for the protocol design, and the security model of the back end under the trusted computing guarantee provides a safe environment for the protocol operation, and also provides a reliable guarantee for the last designed tracing traceability scheme.
【學(xué)位授予單位】:天津大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP391.44;TN929.5
【參考文獻(xiàn)】
相關(guān)期刊論文 前7條
1 王震宇;劉鑫杰;任杰;劉海雷;吳杰;;嵌入式終端可信計(jì)算環(huán)境的關(guān)鍵技術(shù)[J];計(jì)算機(jī)工程;2008年22期
2 周永彬;馮登國;;RFID安全協(xié)議的設(shè)計(jì)與分析[J];計(jì)算機(jī)學(xué)報(bào);2006年04期
3 徐明迪;張煥國;趙恒;李峻林;嚴(yán)飛;;可信計(jì)算平臺(tái)信任鏈安全性分析[J];計(jì)算機(jī)學(xué)報(bào);2010年07期
4 馬昌社;;前向隱私安全的低成本RFID認(rèn)證協(xié)議[J];計(jì)算機(jī)學(xué)報(bào);2011年08期
5 張策;崔剛;傅忠傳;;TCG下可信度量機(jī)制與模型分析[J];哈爾濱工業(yè)大學(xué)學(xué)報(bào);2013年01期
6 李福林;李立新;周雁舟;徐寧;;基于可信計(jì)算平臺(tái)的統(tǒng)一認(rèn)證系統(tǒng)模型[J];武漢大學(xué)學(xué)報(bào)(理學(xué)版);2009年01期
7 鎖琰;徐小巖;張毓森;張濤;桂荊京;楊莉;樂康;;支持組件動(dòng)態(tài)更新的遠(yuǎn)程證明[J];西安電子科技大學(xué)學(xué)報(bào);2011年04期
,本文編號(hào):1841913
本文鏈接:http://sikaile.net/guanlilunwen/gongyinglianguanli/1841913.html