Font Size: a A A

Design And Analysis Of Security Protocol For RFID Systems

Posted on:2017-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y WangFull Text:PDF
GTID:2348330518994820Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,the Internet of Things is developing at an unprecedented rate in all walks of industrial applications around the world.As one of the most critical technology of IoT,RFID technology has become a research hotspot.However,the current research of LLRP technology mainly focuses on technical applications.the security-related research is few and mostly remains at the theoretical level,which cannot meet the requirements of low consumption and lightweight characteristics requirements of RFID systems,therefore,it is difficult for industrial promotion.Currently,RFID systems used in production practice mostly do not have or have only basic security functions.Faced with the ubiquitous security risks,security capacity of the system is very fragile.Based on the above situation,this paper undertakes an in-depth study of security mechanisms and system performance of RFID systems,designs a tag-based security detection method for RFID background system and proposed secure mechanisms based on tripartite credibility for RFI D systems.The main research achievements are as follows:1.Analyze and summarize the main security threats and privacy problems of RFID systems based on the study of latest research results at home and abroad,and describe the system security protection mechanisms from the physical and logical perspectives;2.According to the security features of RFID systems,propose a tag-based security detection method for RFID background system.Build a prototype system for detecting,and attack against the system using SQL injection method.And then,according to the detection result,expound the vulnerability characteristics of RFID systems;3.According to the security features of RFID systems,propose secure mechanisms based on tripartite credibility for RFID systems.Meanwhile,describe the design idea and implementation process in detail,and evaluate its security performance using both non-formal and formal analysis methods.In the part of non-formal analysis,discuss the advantages of the proposed protocol by comparing its performance with three classic protocols of the same kind.In the part of formal analysis,choose colored Petri net technology to model the proposed protocol and prove the security and accessibility of protocol status by matrix theory and related theorems.
Keywords/Search Tags:RFID, Privacy Security, SQL injection, security Protocol, Colored Petri Net
PDF Full Text Request
Related items