Font Size: a A A

Research Of Security Protocol To RFID System In Perception Layer Of Internet Of Things

Posted on:2015-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:R X ZhangFull Text:PDF
GTID:2298330434460708Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the advent of the internet of things, RFID technology which as the main technologyin internet of things has been put more and more attention. In the perception layer, the mainfocus of RFID technology is identification, but due to their limited resources which limit thedevelopment of the technology. In the coming internet of things, requirements to RFIDtechnology in the perception layer are: low cost, high degree of safety.How to ensure privacy and security of RFID system plays a decisive role in thedevelopment of internet of things. The thesis focuses on the research of security protocol toRFID system. In order to meet such low-cost tags privacy, researchers have proposed anumber of research programs. HB family protocols which are based on LPN problem aremore useful in RFID system.This thesis is mainly divided into two parts, one of which, analysis HB family protocolswhich are based on LPN problem (learning parity noisy environments), these protocols wereimproved by all kinds of methods, which include algorithm design, hardware design and so on.But no matter how the researchers improve the HB-family protocol, the type of attack againstMIM OOV made, there is still no effective means to prevent such attacks. This article is basedon MIM attacks, when it works, how to ensure that RFID tags will not be traced by theadversary who cannot get information which are before the RFID systemcommunication-related, and then carry out further damage. Therefore, the F-HB protocol isanalyzed from the security and privacy aspects, and which shows that the new proposedprotocol does play a forward private security.Secondly, this paper proposes an alternative approach, which is introduction of therotation factor and compensation factor in HB protocol, the analysis showed that it greatlyimproves difficulty of HB protocol to be broken by small increasing the storage andcomputing in a RFID tag.In the coming internet of things, on the hardware side, magnetic memories might replacetraditional ones. As scientists develop new types of magnetic memories, cryptographers mightbe able to use some features of those memories to increase security. Taking the best from bothhardware and software will eventually lead cryptographers to a good level of security andprivacy.
Keywords/Search Tags:Internet of Things, the perception layer, RFID technology, LPN problem, HB family protocols
PDF Full Text Request
Related items