Font Size: a A A

Research On RFID Security Technology In Trusted Internet Of Things

Posted on:2019-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y ChenFull Text:PDF
GTID:2428330566970908Subject:Integrated circuit engineering
Abstract/Summary:PDF Full Text Request
Trusted Io T is deeply integrated with trusted computing technology based on the Internet of Things.Trusted IoT realizes the interaction of trusted,controllable and scalable between information world and physical world.The security of RFID technology is the cornerstone of Internet of Things which has high significance and application value.RFID technology is the core of the Io T perception layer,it can realize real-time information interconnection between items without human operation through non-contact automatic recognition and data exchange.Electronic tag in RFID system has limited storage resources and weak computing ability,it's communication link with the reader is in an open environment,which is easy to be attacked of channel,and may also be subjected to the counterfeit attack from inner system.Information security has become the main contradiction that restricts the development of IoT.According to the different application environment and the actual needs,this paper studies the RFID security authentication protocol,the main work includes the following three aspects:(1)Aiming at the RFID system with weak hardware resources and low security requirements,a lightweight two-way security authentication protocol is proposed by combining the monotonicity of timestamp and the anti-collision and tamper resistance of Hash function based on the analysis of the RFID lightweight security authentication protocol.The protocol is proved theoretically by logical analysis which is based on GNY syntax and rules.Then the protocol's security is analyzed,which can resist common types of attacks such as replay,eavesdropping and tracking,and has the security of forward channel.Moreover,considering the restriction of the electronic label,the storage requirement and the amount of calculation are quantitatively analyzed in the protocol,which can meet the requirements of the low cost RFID system.(2)Aiming at the RFID system with high hardware resource and high security requirement,combining key matrix with key array,adding a dense value synchronous update detection label,a secure authentication protocol based on key array and key matrix is proposed by using the powerful storage and computing power of the cloud server.Through the matrix numerical experiment,the function of solving the inverse matrix of the model P is written in the Matlab environment,and the related encryption and decryption operation is completed,verifying the state transformation of the key data in label and cloud server.Then the protocol's security is analyzed,which not only resists many common attacks such as tampering,retransmission,forgery,but also prevents attacks from inside the system.At the same time,the computation amount of the protocol in the whole authentication process shows that the computation cost is relatively low in the same level security authentication protocol.(3)In order to study the engineering application of the security authentication protocol,the radio frequency chips and tags supporting the 3 Pass Authentication protocol are selected.Based on this,designing and implementing a typical RFID embedded application system which is RFID electronic wallet system.According to the functional requirement of the system and the technical requirements of the chip,the control processing program design,the three pass authentication protocol and the anti-collision algorithm are realized in the Keil uVision5 integrated development environment,and the firmware is completed.Meanwhile,the software development of the upper computer control system is realized under the environment of Visual Studio 2010.It lays the foundation for the research of RFID embedded application system.
Keywords/Search Tags:Trusted Internet of things, radio frequency identification, security technology, authentication protocol, electronic wallet system
PDF Full Text Request
Related items