面向物聯(lián)網(wǎng)的輕量級RFID安全認(rèn)證協(xié)議研究
發(fā)布時間:2018-09-11 13:13
【摘要】:物聯(lián)網(wǎng)已成為當(dāng)前世界新一輪經(jīng)濟(jì)和科技發(fā)展的戰(zhàn)略制高點之一,物聯(lián)網(wǎng)的發(fā)展對于促進(jìn)經(jīng)濟(jì)發(fā)展和社會進(jìn)步有著重要的現(xiàn)實意義。射頻識別(Radio Frequency Identification, RFID)技術(shù)是實現(xiàn)物聯(lián)網(wǎng)的關(guān)鍵技術(shù)之一,作為一種自動識別技術(shù),它是利用射頻信號實現(xiàn)無接觸的信息傳遞,以達(dá)到識別物體的目的。近年來,隨著RFID系統(tǒng)在各行各業(yè)的應(yīng)用,在保證安全性的前提下,盡量縮減系統(tǒng)的開銷已經(jīng)成為一個重要課題。 在此背景下,本文介紹了物聯(lián)網(wǎng)的體系結(jié)構(gòu)和RFID系統(tǒng)的分類及其工作原理,對RFID技術(shù)在物聯(lián)網(wǎng)中的應(yīng)用進(jìn)行了總結(jié),并且對物聯(lián)網(wǎng)和RFID安全認(rèn)證協(xié)議的國內(nèi)外研究現(xiàn)狀進(jìn)行了概括,其中,對當(dāng)前流行的輕量級認(rèn)證協(xié)議進(jìn)行了重點介紹。然后,分析了RFID認(rèn)證協(xié)議面臨的典型攻擊,并列舉了一些常見的RFID系統(tǒng)的安全隱患。在此基礎(chǔ)上,文中分析了有關(guān)的一些RFID認(rèn)證協(xié)議,比較了優(yōu)勢和劣勢。此外,本文以輕量級認(rèn)證協(xié)議LMAP++為例,通過分析,指出了協(xié)議易受到跟蹤攻擊,并針對此漏洞提出了解決辦法,形成了新的認(rèn)證協(xié)議。新的協(xié)議沿襲了LMAP++協(xié)議成本低、輕量級的優(yōu)點,并通過修改傳遞參數(shù)的方法提高了協(xié)議的安全度。最后,對改進(jìn)后的協(xié)議用數(shù)據(jù)驗證方法、攻擊檢驗方法和形式化邏輯方法證明了其安全性,分析了其算法復(fù)雜度、存儲狀況,并通過軟件仿真模擬其工作過程以說明其性能。 本文改進(jìn)后的協(xié)議保留了原協(xié)議計算簡便、認(rèn)證效率高的特性,在計算過程中只采用了簡易的比特運算,不僅成本很低,而且其安全性也在原協(xié)議的基礎(chǔ)上得到了很大改善。在物聯(lián)網(wǎng)應(yīng)用得到高速普遍發(fā)展的背景下,具有低成本以及高安全性的RFID安全認(rèn)證協(xié)議可以滿足大規(guī)模部署RFID設(shè)備的需要,在物流、交通、電力、醫(yī)療等領(lǐng)域發(fā)揮其重要作用。
[Abstract]:The Internet of things has become one of the strategic commanding points of the new round of economic and technological development in the world. The development of the Internet of things has important practical significance for promoting economic development and social progress. Radio frequency identification (Radio Frequency Identification, RFID) technology is one of the key technologies to realize the Internet of things. As an automatic identification technology, it uses radio frequency signal to realize contactless information transmission, so as to identify objects. In recent years, with the application of RFID system in various industries, it has become an important issue to reduce the cost of the system under the premise of ensuring security. In this context, this paper introduces the architecture of the Internet of things, the classification of the RFID system and its working principle, and summarizes the application of RFID technology in the Internet of things. And the research status of Internet of things and RFID security authentication protocol at home and abroad has been summarized, among which, the current popular lightweight authentication protocol has been emphatically introduced. Then, the typical attacks of RFID authentication protocol are analyzed, and some common security risks of RFID system are listed. On this basis, some RFID authentication protocols are analyzed, and the advantages and disadvantages are compared. In addition, this paper takes the lightweight authentication protocol LMAP as an example, points out that the protocol is vulnerable to trace attack, and puts forward a solution to this vulnerability, forming a new authentication protocol. The new protocol inherits the advantages of low cost and lightweight of LMAP protocol, and improves the security of the protocol by modifying the transfer parameters. Finally, the security of the improved protocol is proved by using data verification method, attack verification method and formal logic method. The algorithm complexity and storage state are analyzed, and its working process is simulated by software simulation to illustrate its performance. The improved protocol retains the characteristics of simple calculation and high authentication efficiency. It only uses simple bit operation in the calculation process, which not only has a very low cost, but also improves its security greatly on the basis of the original protocol. With the rapid development of Internet of things (IoT) applications, the RFID security authentication protocol with low cost and high security can meet the needs of large-scale deployment of RFID equipment and play an important role in the fields of logistics, transportation, electricity, medical treatment and so on.
【學(xué)位授予單位】:北京交通大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP391.44;TN929.5
本文編號:2236781
[Abstract]:The Internet of things has become one of the strategic commanding points of the new round of economic and technological development in the world. The development of the Internet of things has important practical significance for promoting economic development and social progress. Radio frequency identification (Radio Frequency Identification, RFID) technology is one of the key technologies to realize the Internet of things. As an automatic identification technology, it uses radio frequency signal to realize contactless information transmission, so as to identify objects. In recent years, with the application of RFID system in various industries, it has become an important issue to reduce the cost of the system under the premise of ensuring security. In this context, this paper introduces the architecture of the Internet of things, the classification of the RFID system and its working principle, and summarizes the application of RFID technology in the Internet of things. And the research status of Internet of things and RFID security authentication protocol at home and abroad has been summarized, among which, the current popular lightweight authentication protocol has been emphatically introduced. Then, the typical attacks of RFID authentication protocol are analyzed, and some common security risks of RFID system are listed. On this basis, some RFID authentication protocols are analyzed, and the advantages and disadvantages are compared. In addition, this paper takes the lightweight authentication protocol LMAP as an example, points out that the protocol is vulnerable to trace attack, and puts forward a solution to this vulnerability, forming a new authentication protocol. The new protocol inherits the advantages of low cost and lightweight of LMAP protocol, and improves the security of the protocol by modifying the transfer parameters. Finally, the security of the improved protocol is proved by using data verification method, attack verification method and formal logic method. The algorithm complexity and storage state are analyzed, and its working process is simulated by software simulation to illustrate its performance. The improved protocol retains the characteristics of simple calculation and high authentication efficiency. It only uses simple bit operation in the calculation process, which not only has a very low cost, but also improves its security greatly on the basis of the original protocol. With the rapid development of Internet of things (IoT) applications, the RFID security authentication protocol with low cost and high security can meet the needs of large-scale deployment of RFID equipment and play an important role in the fields of logistics, transportation, electricity, medical treatment and so on.
【學(xué)位授予單位】:北京交通大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP391.44;TN929.5
【共引文獻(xiàn)】
相關(guān)期刊論文 前1條
1 WEI Guoheng;ZHANG Huanguo;;A Lightweight Authentication Protocol Scheme for RFID Security[J];Wuhan University Journal of Natural Sciences;2013年06期
相關(guān)博士學(xué)位論文 前1條
1 曹崢;物聯(lián)網(wǎng)中RFID技術(shù)相關(guān)安全性問題研究[D];西安電子科技大學(xué);2013年
相關(guān)碩士學(xué)位論文 前3條
1 何利偉;安全高效的RFID雙向認(rèn)證協(xié)議設(shè)計與分析[D];西安電子科技大學(xué);2013年
2 鄭振龍;RFID安全認(rèn)證協(xié)議研究與實現(xiàn)[D];北京交通大學(xué);2014年
3 楊欣;RFID認(rèn)證協(xié)議研究與設(shè)計[D];西安電子科技大學(xué);2014年
,本文編號:2236781
本文鏈接:http://sikaile.net/kejilunwen/wltx/2236781.html
最近更新
教材專著