Font Size: a A A

Research And Application Of The Privacy Protection Policy In The Internet Of Things

Posted on:2013-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y LuFull Text:PDF
GTID:2248330377955246Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
IOT brings many benefits for people while it also brings the increasingly prominent issues of privacy. Because IOT extends the access of network end to things, we can image that when all of things interconnect with the networks, the issue of information security on perceptual layer becomes mostly prominent. Firstly, perceptual layer is mainly implemented by wireless networks, so the invisible and continuous data may be exchanged between people and people or between people and thing even between thing and thing. Nevertheless, this situation may be unknowable for users and holders. Besides, the popularization of IOT and the pervasive RFID tags can lead the problem of revealing user’s privacy. In these scenarios, user will have contradictive psychology during the procedure of usage. Thus, it will limit the development of IOT to great extent.This thesis focuses on the security technology of perceptual layer in IOT. At the aspect of authentication, this thesis proposes two improved protocols with the study of the relevant privacy protection policies, respectively between reader and back-end server, and between reader and tags. The former is based on PKI, while the latter is based on Hash function. Both of them ensure the privacy of users not to be disclosed. At the same time, with the analysis of security, it verifies the correctness and feasibility of the proposals. The two improved policies are designed with the comprehension of limitations, so they are practical.
Keywords/Search Tags:IOT, Privacy Protection, PKI, Hash Algorithm, RFID
PDF Full Text Request
Related items