Font Size: a A A

Research & Design On Authentication Protocol Of RFID Oriented To Internet Of Things

Posted on:2012-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:C LiangFull Text:PDF
GTID:2178330338950165Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Internet of Things, based on the computer network, is a real network which uses EPC and Radio Frequency Identification technique to cover everything in the world. In the Internet of Things, every product has the only one EPC which is stored in an electronic label made by chip and adhered to the product. So it can be recognized by reading device and then be transfered through the internet, which provide people great convenience in their daily lives. Among all the key techniques used in Internet of Things, how to recognize the EPC code message in the electronic label is the most crucial one.Because of the limited RFID system resource, traditional security methods cannot be used directly. At the same time, the types of attack toward the RFID are increasing. So security becomes the key factor which restricts the development of RFID system and even restricts the progress of Internet of Things.This paper introduces the conception of Internet of Things and the background of REID, describes the basic principle of RFID, and then analyzes every kind of attack toward the RFID system. To solve the most crucial problem of security in the RFID system, there are some kinds of common RFID security authentication protocol to analyze, for example, the hash-lock protocol, the random hash-lock protocol, the hash-chain protocol, all of which have shortcomings obviously. According to those shortcomings and the special safety requirement in RFID system, the paper provides a modified RFID security authentication protocol, which can ensure the security of RFID system to a certain extent considering limited RFID system resource, regulated cost and controled computation. What is more, according to the analyses, the modified RFID security authentication protocol can satisfy the requirements of safety and performance properly. In this case, it can be indicated that the modified protocol is better than the other protocols, after the contrast in safety, computation and storage capacity. In order to make the conclusion convictive, this paper proves its logic using GNY logic.
Keywords/Search Tags:Internet of things, RFID, Lightweight, Authentication, Privacy, GNY
PDF Full Text Request
Related items