用户名: 密码: 验证码:
Security and Performance Analysis for RFID Protocols
详细信息   
  • 作者:Liang ; Bing ; M.Sc.
  • 学历:M.Sc.
  • 年:2011
  • 关键词:Analysis ; Benchmark ; Performance ; Protocol ; RFID
  • 导师:Li, Yingjiu
  • 毕业院校:Singapore Management University
  • Department:School of Information Systems
  • 专业:Computer Engineering, Computer science
  • ISBN:9781124506043
  • CBH:1489343
  • Country:Singapore
  • 语种:English
  • FileSize:1499163
  • Pages:94
文摘
Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, many new methods have been proposed to improve the security of RFID systems, such as disabling tags, agent management and establishing cryptographic protocols. Among them, we focus on the last approach, which is more economic and convenient in certain cases.
    
    
    The first part of our work is to categorize typical existing RFID protocols according to their security levels. The result is vitally important to RFID system administrators who need to find different protocols to be implemented in their systems. The trade-off to be made in decision is that higher security level typically implies worse performance.
    
    
    We examine the performance in two aspects: the look-up cost in RFID reader's back-end database and the tag-related cost. The tag-related cost includes the cryptographic operation cost (cryptographic computation cost along with access operation cost in RFID tag's chip memory), and the communication cost between reader and tag. We perform traditional database complexity analysis to assess the database look-up cost, and conduct experiments to evaluate both the cryptographic operation cost and and communication cost, so as to have a thorough understanding of the overall time cost of each RFID protocol. This work is important because efficiency is a major concern in the design of RFID protocols, especially when high security level is achieved with complex cryptographic operations being performed on resource-limited RFID tags. An inefficient RFID protocol could be a bottleneck of the whole system in real applications.
    
    
    Finally, we benchmark the performance of each RFID protocol, compare performance of protocols in different security levels and investigate the extra cost required to achieve certain security properties. We find a trade-off between look-up cost and tag-related cost. Based on the results of performance benchmarks, we revise some existing protocols and propose several design suggestions for creating new RFID protocols.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700