Font Size: a A A

Security Research And Model Design Of The Internet Of Things Based On Rfid

Posted on:2015-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y T ZhangFull Text:PDF
GTID:2268330431953821Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Internet of things (IoT) is an important part of building the smarter planet, and attracts the attention of many researchers. Internet of things is committed to connect all devices human can touch and all objects people used. The related information is involved in IoT to promote the development of the economy and to provide better support. Internet of things based on RFID tag shows security problems and these problems have been unable to effectively solve. Other Internet of things in the transportation, logistics and the rapid development of intelligent medical and other fields, Internet security issues are also facing a more difficult task.Through the study of the development history of the Internet of things, and the researchers both home and abroad in the field of Internet security analysis we proposed the security research subject of IoT based on the RFID tag. First we analysis some key technologies of Internet of things, such as RFID technology, EPC coding and network and the security problem. Based on the characteristic of the RFID system, we put forward a two-way authentication protocol based on the key and the hash function. The content of the agreement represented a detailed description, then the problem such as security, reliability of the protocol based on GNY logic and compares the formal proofs. An anonymous authentication protocol is proposed based on a third-party authentication server.Through the analysis of protocol based on the key and the hash function and the prove of the rationality of the based on GNY logic and proves the correctness and reliability of the certification agreement. Anonymous transmission based on third-party certification server authentication protocol also shows strong applicability. This protocol has certain inspiration and applicable significance on Internet of things.
Keywords/Search Tags:Internet of things, security issues, RFID tag, ONS
PDF Full Text Request
Related items