Font Size: a A A

Duplication-resistant Wireless Digital Identification,Protocols And System Implementation

Posted on:2018-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:X Q LiuFull Text:PDF
GTID:2348330542961670Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At present,the wireless digital identification technology is widely used in the Internet of things,smart city,smart home and other fields,and its security issues are more and more prominent.This topic is based on this background,aiming to improve the wireless communication technology protocol through dynamic secret technology,and propose an innovative way to strengthen the security of wireless digital identity technology.Wireless digital identification technology is closely related to short-range wireless communication technology.This paper gives a brief introduction for the theoretical research and practical application of the identity identification technology based on ZigBee,RFID and NFC.And studied they security by theoretical analysis and specific examples.In addition,this paper describes the identity technology based on Bluetooth in detail,and focuses on its security issues.It is intended to make a useful exploration to solve general problems through typical research.There are many researches on the wireless digital identity technology.The writing of this paper not only summarizes and analyzes the existing research work,but also has inheritance and innovation.The innovation is mainly reflected in the following points.Firstly,dynamic secret theory and technology are applied to wireless digital identification technology to improve its security.The basic idea of dynamic secret is to enhance the security of wireless communication through a series of low complexity protocols based on packet retransmission mechanism.It is a useful supplement to the existing security system.For attackers,real time updates of keys during communications are difficult to track and unpredictable.Second,this paper proposed a solution based on dynamic secret theory aiming at the security authentication scene in wireless communication.The protocol is designed in two phases,which are used to implement the device key initialization and authentication.the new protocol effectively prevent the risks that attackers stealing keys and forging authentication,and enhance the security of the wireless digital identification technology.Third,this paper designed and implemented an duplication-resistant authentication system.In the embedded platform based on Bluetooth communication technology,through the authentication protocol code complete the design of wireless digital identification technology.And realizes the identity authentication system,which has the characteristics of duplication-resistant,short delay and easy deployment.
Keywords/Search Tags:identity authentication protocol, bluetooth protocol, dynamic secret, communication security, wireless communication
PDF Full Text Request
Related items