Font Size: a A A

Research Of RFID Authentication Protocol Based On WSN

Posted on:2016-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q WangFull Text:PDF
GTID:2308330467498920Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network is a self-organized network which is spatially distributedautonomous sensors that monitor physical or environmental conditions and pass their datathrough the network to a main location. It can be said WSN has changed the way of peopleto observe and participate in the nature.Radio frequency identification technology is a non-contact automatic dataidentification technology. RFID has the features of non-contact, low cost, no barrier to read,suitable for multitasking and harsh working environment. Some scholars predicted thatRFID will be the leader of technological innovation.As the two core technologies of the Internet of Things, integration applications ofWSN and RFID have entered our life. However, the limit factors like wirelesscommunication, open channel, weak calculation ability and small storage space have leadto the security threat to the fusion system. To protect the data security and privacy of theWSN and RFID fusion application system, this paper puts forward a RFID authenticationprotocol based on WSN.This paper is based on Hash encryption function. First put forward the secrete keyupdated and hash based RFID mutual authentication protocol (SKUHMAP) aiming at thetypical communication model. Then design the WSN based RFID mutual authenticationprotocol (WRMAP) which fits the WSN and RFID fusion application system of which thechannel between reader and server is insecurity.The SKUHMAP and WRMAP protocols can prevent common attacks of RFID system.The protocols adopt Hash encryption with the key updated and random mechanism toimprove the security of the whole system. The protocols also use index mechanism toreduce the time complexity and load of the server so that to improve the efficiency of thetag authentication. Then the paper uses BNA logic to verify the security of the twoprotocols. Finally, simulate the authentication protocols and verify the feasibility of theprotocols.
Keywords/Search Tags:WSN, RFID, Hash, Secure authentication protocol
PDF Full Text Request
Related items