Font Size: a A A

The Study On Lightweight RFID Security Authentication Protocol For The Internet Of Things

Posted on:2015-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:F ZengFull Text:PDF
GTID:2298330431487299Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Things, it has a great influence of the economy and the society.In2008, after the outbreak of the economic crisis, in order to seek a new economic growth point, the USA government pays high attention to the Smart Planet which is introduced by IBM aiming at the next information flood. From this, it triggers a heat popularity of the Internet of Things all over the world. As a key technology contributing to the Internet of Things, RFID (Radio Frequency Identification) is an automatic identification technology and it uses radio frequency signal to transfer information without touch. With the application of the RFID systems these years, how to balance the cost and security has becoming an important subject.Against this background, this paper introduces the architecture of the Internet of Things and the classification and the working principle of RFID systems. And this paper gives a summary of the application of the RFID security authentication protocol in The Internet of Things. Also, the lightweight mutual authentication protocol is mentioned. After this, this paper analyses some kind of attacking models which make a threat of RFID systems and lists several common security problems of the RFID systems. On this basis, some popular RFID authentication protocols are analyzed and make a comparison of them. Besides, this paper takes lightweight mutual authentication protocol-LMAP++for example and points out the tracing attacking problem. And solution is made to solve the problems. The new protocol inherits the low-cost feature and enhances the security through selecting tags and changing parameters. In the end, this paper uses attacking test method and formal logic to prove that it is secure and analyses the algorithm complexity and storage. And also, software simulation is done to simulate the working process to demonstrate the performance of the protocol.The improved protocol maintains the easy operation and high efficiency features, only simple calculation is applied into this protocol. This results in the low cost and high security. Against the background of the rapid development of the Internet of Thins, RFID authentication protocols with low cost and high security meet the demand of the deploying RFID equipment in a large scale. In the field of the logistics, transportation, electricity, and medical industry, RFID will play an important role. This is significant to enhance the development of the domestic economy and promote the construction of socialist modernization.
Keywords/Search Tags:RFID, the Internet of Things, authentication protocol
PDF Full Text Request
Related items