Loading...

Analysis of Authentication Protocols in RFID Systems

Aghaee Farouji, Majid | 2012

474 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 42619 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Eghlidos, Traneh
  7. Abstract:
  8. Radio frequency identification systems (RFID) were used in the past to identify physical objects. Along with the development of RFID systems and its wide range of applications in our daily life, the need for privacy in such systems is becoming more and more significant. Authentication protocols are used as the care of secure communication to preserve the privacy and security in RFID systems. In this thesis the security of authentication protocols against general attacks are investigated, using two typical authentication protocols. As an alternative, we use a privacy model as another tool to analyze two other types of authentication protocols. The results reveal the weakness in the design of data transfer between the tag and the reader. As remarkable points, the linear correlation between different messages sent in a round or similar messages in different rounds of protocol implementation, and independence of authentication message and confidential data update message are worthy of mention. Considering these facts, we propose some improvements to the design of the underlying protocols to resist against the existing threats
  9. Keywords:
  10. Privacy ; Cryptography ; Radio Frequency Identification (RFID) ; Authentication Protocols ; Security Threats

 Digital Object List

 Bookmark

No TOC