Font Size: a A A

Research And Application On Security Technology Based On RFID System In Internet Of Things

Posted on:2013-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:W HuFull Text:PDF
GTID:2248330362471968Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The internet of things (TIOT), which covers with every goods all over the world, isbased on the internet, and realized through RFID (radio frequency identification) technology,wireless communication technology and computer technology. RFID technology has thesuperior characteristic to rewrite the data message in real-time, so non-contact smart cards,RFID tags, readers which are the underlying equipment items of TIOT, are provided forthe supply chain business as the management of goods. the RFID-based internet of thingsoften works as follows: when RFID tag goes into the range of RFID reader, the taginformation is read through the reader and handed in the RFID middleware toprocess. And then the RFID middleware made a series of data processing as the dataanalysis, and delivered the data to the back-end system. The private information of users orimportant information of goods is often stored in RFID tags, which can be eavesdropped ortampered in the process of transmission. In addition, as the RFID system become one of themost important applications, the security problems of RFID system have been entered thesight of society.The existence of security threats for each of the components of multi-level frameworkof the RFID-based Internet of things proposed by the EPC Global are analyzed. Inaddition, there exists a kind of new security threat in the special application of RFID system.Most of RFID tags, which are low-cost tags, have not enough computing storagespace so that complex symmetric cryptography can not be used. In this paper, someexisting RFID authentication protocols begin to be analyzed and a new mutualauthentication protocol, which is based on the use of symmetric encryption and dynamicupdate key and prevents the denial-of-service attack, is designed for RFID system.A detailed analysis of security threats, which exist in the back-end system of thearchitecture, are conducted. We have come to conclusion that security threats are actuallycaused by the virus code embedded into tags, and provided a solution for that. And then anew solution for threats is designed for this kind of threats. In this paper, a simulatorsoftware, in which we have simulated the security vulnerability of this RFID system and asolution for it, is designed for specific applications of RFID system.
Keywords/Search Tags:Internet of things, RFID system, Security threats, SQL injection attack, Denial-of-service attack
PDF Full Text Request
Related items