| With the development of the Internet of things, the security of RFID system is gradually concerned by researchers. In the past, most research scholars have focused on improvements of RFID wireless communication protocols and the security of RFID middleware is be seen as security problem of traditional software. In this article, the security of RFID middleware will no longer be seen as traditional software security problem, but from these features of RFID middleware – more powerful in storage capacity and computing. These will be used as a security model to maintain the security of RFID system. In addition, RFID middleware can control reader better due to its logical location in RFID system, so it can used to perform vulnerability scans.For the above, this paper studies the key technologies of RFID security middleware:1. This paper has raisedtwo key technologies – vulnerability detection model and intrusion detection model.System security can be divided into two aspects – attack and defense. Attack corresponds to vulnerability detection model and defense corresponds to intrusion detection model. This paper describes two methods for modeling RFID attacks and discusses the adaptive of these two methods of two models.2. This paper proposed RFID-based attack tree model which applied to vulnerability detection model. Attack tree could be represented in a graphical way or grammar way. It can be used to find the weak point of RFID system easily. RFID attacks are divided into some sub-step attack which corresponds to the leaf nodes of attack tree. Sibling nodes have “orâ€, “and†and “order-and†relationship. Different attack trees can also be combined by rules; the combined attack tree covered multiple attacks.This paper presents an algorithm for generate attack path from attack tree.3. This paper proposed RFID modeling based on finite automaton which applied to intrusion detection model. This modeling can overcome uncomplicated of RFID system that cannotprovide enough attack examples. It collects abnormal data flow from wireless channel through a special reader, and the data flow is detected by finite automata to determine whether the intrusion is. This paper proposes an algorithm for finite automata merging,after merging automata can increase the detection efficiency and predict unknown attacks.4. This paper has analyzed the similarity between the two attack modeling, also algorithm is proposed for conversion between attack tree and finite automata.In the end of this paper, test results of two models have been liested. For vulnerability detection model, a practical effect software diagram has been showed; for intrusion detection model, a table of simulation test have been showed. |