基于ECC的RFID雙向認(rèn)證協(xié)議
本文選題:RFID + 安全協(xié)議; 參考:《長沙理工大學(xué)》2015年碩士論文
【摘要】:無線射頻識別(Radio Frequency Identification,RFID)擁有自動識別物體、快速掃描、識別距離長、安全性高和環(huán)境適應(yīng)能力強等特點,目前被廣泛應(yīng)用于交通、醫(yī)療、身份識別、物流和食品溯源等各大領(lǐng)域,已經(jīng)成為我們?nèi)粘I钪械闹匾画h(huán)。同時,它自身所存在的安全隱患也愈加突出,這樣一來設(shè)計安全高效的認(rèn)證非常有必要。RFID系統(tǒng)通過閱讀器(Reader)與標(biāo)簽(Tag)之間的通信信息來實現(xiàn)對對方的認(rèn)證,由于閱讀器與標(biāo)簽之間的通信是在無線信道中進(jìn)行的,在這樣一個完全開放的網(wǎng)絡(luò)中使得攻擊者有機會對交互信息進(jìn)行竊聽、篡改和截獲等攻擊,導(dǎo)致閱讀器與標(biāo)簽之間無法正常驗證對方是否為合法身份,從而破壞系統(tǒng)的正常運行、竊取標(biāo)簽用戶的隱私信息獲取非法利益的目的。本文首先對基于hash函數(shù)、共享密鑰以及對稱密鑰認(rèn)證協(xié)議的介紹與分析,并指出了非公鑰密碼算法在安全上的不足之處。從而引出了基于橢圓曲線密碼(ECC)的RFID認(rèn)證協(xié)議。通過對Schnorr、Okamato以及EC-RAC安全協(xié)議這些具有代表性的基于橢圓曲線離散對數(shù)問題(ECDLP)的RFID協(xié)議進(jìn)行分析和總結(jié),提出了新的的基于ECC的RFID雙向認(rèn)證協(xié)議,協(xié)議使用隨機數(shù)發(fā)生器、hash運算和異或運算等方式對閱讀器與標(biāo)簽之間的通信信息進(jìn)行加密處理。通過結(jié)合Diffie-Hellman密鑰交換協(xié)議提出了一種新的基于ECC的RFID雙向認(rèn)證協(xié)議,即以ECC技術(shù)為基礎(chǔ)進(jìn)行密鑰交換,確保交互信息的安全。并且在每次認(rèn)證工程中,閱讀器與標(biāo)簽的交互信息都是變化的,使攻擊者難以對標(biāo)簽的位置進(jìn)行鎖定,而且每輪認(rèn)證成功后將會更新隨機數(shù),確保下次會話的安全。最后通過分析其安全性,結(jié)果表明新協(xié)議具有良好的前向安全性,并且可以抵擋跟蹤攻擊、重放攻擊、中間人攻擊、標(biāo)簽偽裝攻擊、拒絕服務(wù)攻擊等常見攻擊能夠?qū)崿F(xiàn)閱讀器與標(biāo)簽的雙向認(rèn)證,保證了用戶的隱私安全,滿足RFID系統(tǒng)的基本要求。
[Abstract]:Radio Frequency Identification (RFID) has the characteristics of automatic object identification, fast scanning, long identification distance, high security and strong adaptability to the environment. At present, it is widely used in various fields such as transportation, medical treatment, identification, logistics and food traceability. Has become an important part of our daily life. At the same time, its own security hidden danger has become increasingly prominent, so it is very necessary to design a secure and efficient authentication. RFID system can authenticate each other through the communication information between reader and tag. Since the communication between readers and tags takes place in wireless channels, in such a completely open network, attackers have the opportunity to eavesdrop, tamper and intercept interactive information. As a result, the reader and the tag can not normally verify the other person's legal identity, thus destroying the normal operation of the system and stealing the privacy information of the tag user for the purpose of obtaining illegal benefits. This paper first introduces and analyzes the hash function, shared key and symmetric key authentication protocol, and points out the shortcomings of the non-public key cryptographic algorithm in security. The RFID authentication protocol based on ECC is introduced. Based on the analysis and summary of Schnorrn Okamato and EC-RAC security protocols, which are representative RFID protocols based on elliptic curve discrete logarithm problem, a new RFID bidirectional authentication protocol based on ECC is proposed. The protocol uses random number generator hash operation and XOR operation to encrypt the communication information between reader and tag. A new RFID bidirectional authentication protocol based on ECC is proposed by combining with Diffie-Hellman key exchange protocol, that is, key exchange based on ECC technology to ensure the security of interactive information. In each authentication project, the interactive information between reader and tag is changed, which makes it difficult for the attacker to lock the location of the tag, and the random number will be updated after each successful authentication to ensure the security of the next session. Finally, by analyzing its security, the results show that the new protocol has good forward security and can resist tracking attack, replay attack, man-in-the-middle attack, label camouflage attack. Denial of service attacks and other common attacks can achieve the two-way authentication of readers and tags, ensure the privacy of users, and meet the basic requirements of RFID system.
【學(xué)位授予單位】:長沙理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2015
【分類號】:TP391.44
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 馮君;汪學(xué)明;;基于超橢圓曲線密碼體制的RFID安全協(xié)議[J];計算機工程與設(shè)計;2013年10期
2 張m蟦\;王斌;;基于對稱密碼體制的RFID安全協(xié)議[J];現(xiàn)代電子技術(shù);2013年05期
3 楊超;張紅旗;;基于秘密共享方案RFID認(rèn)證協(xié)議[J];計算機應(yīng)用;2012年12期
4 康鴻雁;;一種基于ECC的RFID雙向認(rèn)證協(xié)議設(shè)計[J];計算機應(yīng)用與軟件;2012年09期
5 王明輝;王建東;;高效的RFID雙向認(rèn)證協(xié)議[J];計算機應(yīng)用;2011年10期
6 鐘杰卓;;基于Hash鏈的RFID安全協(xié)議研究與設(shè)計[J];現(xiàn)代計算機(專業(yè)版);2010年08期
7 楊靈;陳志強;;一種低成本RFID的雙向認(rèn)證協(xié)議[J];計算機應(yīng)用與軟件;2010年08期
8 胡焰智;馬大瑋;田增山;李曉飛;;基于ECC的雙向認(rèn)證及密鑰協(xié)商方案的分析與改進(jìn)[J];計算機工程與設(shè)計;2009年02期
9 王春生;姚云飛;;橢圓曲線上的基的選擇與實現(xiàn)[J];大學(xué)數(shù)學(xué);2006年02期
10 周永彬;馮登國;;RFID安全協(xié)議的設(shè)計與分析[J];計算機學(xué)報;2006年04期
,本文編號:1935092
本文鏈接:http://sikaile.net/guanlilunwen/wuliuguanlilunwen/1935092.html