Font Size: a A A

RFID Authentication Protocol And Middleware Research In The Internet Of Things

Posted on:2015-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuFull Text:PDF
GTID:2298330434957663Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the current large-scale development of the Internet of Things, RadioFrequency Identification (RFID) as one of its key technology has become a hotspotof research and application of various countries. RFID technology has been widelyapplied in the field of building energy efficiency, video security detection, trafficcontrol, pharmaceutical management and other fields. RFID systems bringconvenience to people’s lives, improve efficiency, but also brought new problems topeople’s life, such as electronic tags are embedded in the item owner will not becontrolled by scanning, positioning and tracking, violations privacy of individuals andnations. Current security issues facing the RFID system can be divided into two areas:①The data transmission between tag and reader is insecurity;②low-frequency tagscost and safety is a contradiction in practical applications,and also limit the massivepopularity of RFID systems.Paper analyzes the RFID system may face a variety of attacks, on the basis of theexisting protocols and algorithms taking into account the cost of tags, storage andcomputing capacity limiting factor to design a low cost of tag requirements, thesystem load is small, high security authentication protocol-Based on Asymmetrickeys and Hash Functions of RFID mutual authentication protocol (AKHL,Asymmetric Key and the Hash-Lock), proposed two label update method. Throughreasoning, analysis and BAN logical, results showed: AKHL proposed protocol canprovide both high security protection for RFID systems and have higher efficiency、lower cost, to meet most application scenarios demand.RFID middleware system isalso studied In this paper. RFID middleware designed into four modules (RFID dataprocessing module, the reader management module, the application managementmodule and the data transfer module). Each module is analyzed and described, forsubsequent research laid the foundation.
Keywords/Search Tags:RFID security, Hash functions, authentication protocols, asymmetric keys, middleware
PDF Full Text Request
Related items