Font Size: a A A

Research And Implement On RFID Security Authentication Technology In Internet Of Things

Posted on:2014-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:B Y GuoFull Text:PDF
GTID:2268330422967378Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The internet of things (IOT) is an internet among things, which is based on RadioFrequency Identification (RFID) technology, wireless communication technology, computertechnology and so on. In IOT, machines can communicate with each other without theparticipation of people, and it greatly facilitates people’s work and life. RFID technology isone of the key technologies of the IOT, which is a non-contact automatic identificationtechnology. With the development of IOT, RFID technology has been applied more andmore popularly, such as access control systems, identity cards, library management, and soon. However, with the wide application of RFID technology, the security issues havebecome prominent. As the RFID system in IOT carries a large number of user privacyinformation, and its security problem will directly restricting the promotion of the IOT.Therefore, the research on RFID security authentication technology is of great significanceto the healthy development of the IOT.Firstly, the development and research status of IOT and its key technology RFID arebriefly introduced in this paper, including the concept and key technologies of the IOT, andthe basic form and system standard of RFID system. The content and security requirementsof EPC Global C1G2(C1G2) standard is analyzed in detail. Then, the security requirementof RFID system is analyzed, in which the counting attack which is ignored by most of auth-entication protocols is particularly pointed out. The existing RFID security authenticationprotocol based on C1G2standard is briefly presented, in which the protocol proposed bychen and chien is analyzed in detail, and its shortness is pointed out. Based on aboveanalysis, a new RFID mutual security authentication protocol based on C1G2standard isproposed, and its security performance has also been analyzed. Finally, the protocolsimulation is implemented in the environment of Visual Studio2008using C#language.In the protocol simulation program, not only the newly proposed protocol is simulated,the simulation of the other four authentication protocols based on C1G2standard mentionedin this article are implemented as well. By comparing the simulation results of the fiveprotocols, the correctness of the security analysis for the proposed protocol in this paper isverified, which shows that the proposed authentication protocol is safe and effective.
Keywords/Search Tags:Internet of things, RFID system, Authentication protocol, Counting attack
PDF Full Text Request
Related items