Font Size: a A A

Research On AES-based Security Authentication Protocol For Perception Layer Of Internet Of Things

Posted on:2016-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:F YuanFull Text:PDF
GTID:2308330464467959Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Perception layer is an important technology as the core of Internet of things. The most common traditional forms of them are bar codes,2D code labels and Radio Frequency Identification System (RFID). Among them radio frequency identification technology is the the most complex technology of perception layer.it has faster speeds, stronger penetration of interference and other advantages. It combines modern sensor systems, wireless communication systems, GPS systems, etc., which are widely used in industrial management, a number of areas the flow of commerce, traffic management, urban management, medical systems, military management, agricultural management. Because the RFID system working in an open circumstance, leading to some serious security problems, the security protocol of RFID system is urgently demanded to protect each tags and readers to communicate in private and safe environment. This paper takes the advantage of the AES algorithm to encrypt RFID and presents the hardware architecture. In order to make sure the AES encryption algorithm is suitable for hardware implementation, such qualities are needed, for example, low operational complexity, speed, low hardware requirements, and other factors reversible encryption and decryption module.In my paper, I introduce the basic principles of RFID systems and common security issues, at the same time, illustrate the mathematical principles and AES algorithm, and design the AES algorithm program. According to the references, I introduce some typical RFID security protocols, such as:Hash-Lock protocol, Randomized Hash-Lock protocol, Hash-Chain protocol, I analyzed all the common principles, and compare their advantages and disadvantages. In this paper, our purpose is in order to improve the security of the protocol,so we propose a new AES-based security authentication protocol. Finally, I design the AES encryption or decryption hardware circuit and simulate module analysis, as a result I verified it is achievable in hardware to realize AES algorithm. To conclude, I proved that the agreement has high security, and can adapt to a more complex application environments, suitable for a number of security requirements of the occasion. The paper also discusses the hardware implementation of AES algorithm detailed, and uses the basic structure to achieve encryption and decryption operation.
Keywords/Search Tags:Internet of Things, RFID System, Security Protocol, AES algorithm
PDF Full Text Request
Related items