Font Size: a A A

Research And Design Of Information Security Transimission Technology In Asset Management System

Posted on:2018-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y TangFull Text:PDF
GTID:2348330512483279Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Assets as the economic basis of individuals and enterprises,are the basic protection of individuals and enterprises to survive.If there were security problems of assets,it would lead to direct economic losses.Because of the openness of RFID(Radio Frequency Identification)system,asset management system is vulnerable to be attacked,which will be a limit to the further development of RFID technology in asset management and other areas.The thesis proposes and implements a secure transport protocol,which achieves the purpose that the asset information is transmitted safely from the tag to the server through the base station in the asset management system.The main contents of the thesis are as follows:(1)The thesis analyzed existing security threats and security requirements in the asset management system.The thesis also discussed several popular RFID security protocols,analyzed their advantages and disadvantages,and compared them with the protocol proposed in the thesis.(2)A security mechanism based on AES symmetric encryption algorithm is designed to ensure the safety of the information that transmitted between the electronic tag and base station.The thesis used Keil 8051 and Keil ARM software development platform to implement the software program,used the formal analysis method BAN logic to proves the security of the protocol,improved key expansion algorithms of AES algorithms,intensified the security of AES algorithms,and verified the correctness of AES encryption algorithm on the Microsoft Visual Studio 2010 software development platform.(3)The thesis proposed a transmission scheme based on PSAM card to ensure the security of data transmission between the base station and server,designed the security module to manage the key system of the base station,and designed the U-disk portable device to manage the key system of the server.The thesis implemented file structure of PSAM card,the software of security module software and portable device like U disk on Keil ARM software development platform,and designed the server software on the Microsoft Visual Studio 2010 development platform.At the same time,the thesis designed the hardware circuit of security module and portable device like U disk on Altium Designer 2012 development platform.Finally,the thesis used the formalanalysis method BAN logic to prove the security of the protocol and analyzed the anti-attack capability of the protocol.(4)At last,the thesis tested implementation process of the protocol,verified the correctness of the protocol.The protocol proposed in the thesis has the following advantages:The sensitive data is encrypted by AES algorithm,which guarantees the confidentiality of the data effectively,The protocol proposed in the thesis is applicable to the unsafe transmission channel between the reader and the server,and used the PSAM card technology to achieve a symmetric,distributed,static,definite shared key management system,which balanced shared key management overhead and saved the cost of negotiating and updating the key.The use of cryptography and PSAM card technology protected the privacy of information.The security protocol proposed in the thesis is applicable to industrial,logistics,transportation and other industries,and broadens the scope of RFID technology applications.
Keywords/Search Tags:AES symmetric encryption algorithm, BAN logic, RFID security protocol, PSAM card
PDF Full Text Request
Related items