首页> 外文学位 >Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems.
【24h】

Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems.

机译:轻量级的相互认证,所有者转移和用于RFID系统的安全搜索协议。

获取原文
获取原文并翻译 | 示例

摘要

RFID technology can potentially be applied almost everywhere. A typical RFID system involves a reader and a number of tags, which may range from the battery-powered ones with Wi-Fi capabilities, to the low-cost ones that are constrained in resources with even no internal power. Keeping RFID systems secure is important, because they are vulnerable to a number of malicious attacks. As for low-cost RFID systems, security problems become much more challenging, as many traditional security mechanisms are inefficient or even impossible due to resource constraints. Some existing solutions utilize traditional cryptographic primitives such as hash or encryption functions, which are often too expensive in hardware to be implemented on low-cost RFID tags. Furthermore, some other lightweight solutions have been reported to be broken, revealing their keys and ID numbers to the attackers.;In this thesis, we propose lightweight solutions to Mutual Authentication and Ownership Transfer for RFID systems. Mutual Authentication mitigates the issues of eavesdropping and cloning of tags. Only authenticated readers and tags will successfully communicate with each other. Furthermore, we adapt our Mutual Authentication scheme to secure the Ownership Transfer of RFID tags, which is a pertinent issue in the scope of RFID. When an item passes from one owner to another, it is undesirable for the old owner to be able to access the tag or read data from it. The new user must therefore update the access-granting information without revealing this to the old owner. Tag search is another important functionality that a RFID system should provide. In this thesis, we study how to secure tag search with a focus on low-cost RFID systems for which existing solution is not efficient.;These protocols are all realized by utilizing minimalistic cryptography such as Physically Unclonable Functions (PUF) and Linear Feedback Shift Registers (LFSR). PUFs and LFSRs are very efficient in hardware, and provide the low-cost RFID tags with unique characteristics that prevent a multitude of attacks. Compared to existing solutions built on top of hash functions that require 8000--10000 gates, our experimental results show that the schemes we propose demand only between 650--1400 gates for 64 bit variables and can be easily accommodated by the cheapest RFID tags with only 2000 gates available for security functions.
机译:RFID技术几乎可以应用在任何地方。典型的RFID系统包括读取器和许多标签,其范围从具有Wi-Fi功能的电池供电的标签到成本低,甚至没有内部电源限制的低成本标签。保持RFID系统的安全性很重要,因为它们容易受到多种恶意攻击。对于低成本的RFID系统,由于资源限制,许多传统的安全机制效率低下甚至无法实现,因此安全问题变得更具挑战性。一些现有的解决方案利用诸如散列或加密功能之类的传统密码原语,这些原语在硬件上通常太昂贵而不能在低成本RFID标签上实现。此外,据报道还有其他轻量级解决方案被破坏,向攻击者透露了它们的密钥和ID号。在本文中,我们提出了用于RFID系统相互认证和所有权转移的轻量级解决方案。相互身份验证减轻了标签窃听和克隆的问题。只有经过身份验证的读取器和标签才能成功相互通信。此外,我们调整了相互身份验证方案以确保RFID标签的所有权转移,这是RFID范围内的一个相关问题。当物品从一个所有者转移到另一个所有者时,旧所有者无法访问标签或从中读取数据。因此,新用户必须更新授予访问权限的信息,而不要将其透露给旧所有者。标签搜索是RFID系统应提供的另一个重要功能。本文主要研究低成本解决方案对效率不高的低成本RFID系统的安全性。这些协议都是通过使用诸如物理不可克隆函数(PUF)和线性反馈移位之类的最小密码学来实现的寄存器(LFSR)。 PUF和LFSR在硬件方面非常高效,并且为低成本RFID标签提供了独特的特性,可防止多种攻击。与现有的基于散列函数的解决方案相比,该解决方案需要8000--10000门,我们的实验结果表明,我们提出的方案仅需要650--1400门之间的64位变量,并且可以很容易地被价格最低的RFID标签容纳只有2000个门可用于安全功能。

著录项

  • 作者

    Kulseng, Lars Skaar.;

  • 作者单位

    Iowa State University.;

  • 授予单位 Iowa State University.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 M.S.
  • 年度 2009
  • 页码 76 p.
  • 总页数 76
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号