Use this URL to cite or link to this record in EThOS: https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792584
Title: Mutual authentication protocols for RFID special schemes
Author: Abu Ghazalah, Sarah
ISNI:       0000 0004 8499 2712
Awarding Body: Royal Holloway, University of London
Current Institution: Royal Holloway, University of London
Date of Award: 2016
Availability of Full Text:
Access from EThOS:
Access from Institution:
Abstract:
Radio Frequency IDentification (RFID) is a wireless identification technology that uses radio waves to identify tagged objects. RFID systems provide low-cost tagging capabilities for many applications such as access control systems, transportation ticketing, and supply chain management. Providing security and preserving privacy for these systems is challenging. The tags utilised in such applications are low-cost tags with limited resources that cannot afford the use of conventional cryptographic primitives. Thus, low-cost RFID tags might be vulnerable to passive attacks, such as eavesdropping, and active attacks, such as tag cloning, impersonation, replay, data de-synchronization attacks, tag data leakage, forward secrecy invasion and location tracking. There has been considerable research into the mutual authentication of passive RFID tags to combat passive and active attacks, and in this thesis we present analysis of the prior art, which led us to make five academic research contributions. Security is increasingly important, especially for tagging of important objects, and there are growing concerns from users about their privacy. To this end, in this thesis, we studied RFID security and privacy in several schemes, such as in RFID-enabled supply chains, RFID cloud-based scheme, and multi-tag group reading schemes. We focused on how to improve and propose RFID mutual authentication protocols in such schemes that are practical and cost effective, and satisfy the security and privacy requirements. Lastly, we provide a formal analysis of the proposed protocols using CasperFDR and Scyther tools, along with the implementation of the proposed protocols with their performance measures.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID: uk.bl.ethos.792584  DOI: Not available
Keywords: RFID ; Mutual Authentication ; Formal Analysis ; CasperFDR ; Scyther ; DemoTag ; Supply Chain ; Cloud Computing ; Privacy ; Security
Share: