Font Size: a A A

Research On Privacy Protection Model Of RFID Tags Based On Blockchain

Posted on:2021-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:C YinFull Text:PDF
GTID:2428330605974767Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the rise of the Internet of Things concept and the rapid development of RFID(Radio Frequency Identification)technology,the privacy and security issues caused by RFID are becoming increasingly prominent.RFID privacy security issues specifically refer to malicious readers in the system accessing tag data,and it leads to consumer preferences for privacy or leakage of sensitive corporate information.At the same time,due to the wide range of RFID applications,RFID privacy issues are highly related to the application and severe resource constraint.At present,the traditional RFID privacy solution is to design a cryptographic protocol or a model integration method to authenticate the reader.However,there are their own advantages and disadvantages in their respective application scenarios.Therefore,it is necessary to select specific application scenarios and use specific technologies to solve the privacy problems of RFID tags.Blockchain technology has distinctive features such as multi-centralization,strong access control scalability,transparency and openness,etc.,it's very suitable for solving logistics problems in distributed scenarios.Aiming at the characteristics of RFID tag protection and the problems existing in the current solutions,this paper is oriented to the logistics field of RFID and we study the privacy of RFID tags based on blockchain The specific research work is as follows:.(1)Since the performance problems in current main blockchain platforms such as low throughput,slow delay,and poor fault tolerance,as well as the characteristics of distributed nodes in the RFID logistics environment,this paper proposes a dynamic authorization and credit-based mechanism DCBFT consensus algorithm.It aims to improve the performance and fault tolerance of the algorithm from the perspective of improving the PBFT process and introducing credit mechanisms,and we make it suitable for the RFID logistics alliance chain.On the one hand,this algorithm improves the communication process of PBFT "three-phase and three-broadcasting";on the other hand,it introduces the credit evaluation mechanism of DPoS algorithm to the bookkeeping nodes to achieve the effect of dynamic election of bookkeeping nodes,and we make it possible to add and delete nodes dynamically.The experiment measures the performance of the algorithm from three indicators:throughput,delay,and fault tolerance.Experimental results show that,compared with the original PBFT algorithm,the consensus algorithm proposed in this paper can reach thousands of TPS and lower delay.(2)Aiming at the accessing tag data at will by reader users in the current RFID system,as well as the shortcomings of the existing access control solutions,this paper proposes an access control method based on smart contracts,it's designed to quantify reader user access to tag data.This method improves the access rights of subject users to object data by combining three credit evaluation mechanisms and smart contracts.The experimental analysis of three credit evaluation mechanisms and determine the weight ratio of the final credit.Experimental results show that,compared with traditional access control methods,the proposed method has the advantages of more fine-grained permission division and dynamic determination of permissions.(3)In view of the problem that the reliability of the source data on the chain is not considered in the current logistics alliance chain,and the malicious tampering of the label data by malicious readers in the RFID logistics chain,we propose an RFID tag protection model for the alliance chain.The model first uses the fabric-CA certificate mechanism to isolate the unauthenticated reader user's on-chain request for tag data.Then,the access control method and the CA control method proposed in this chapter are fused to generate a new alliance chain access control strategy,and the consensus mechanism of the alliance chain is tested based on the fused access control method.Finally,we perform security analysis and performance analysis on the alliance chain model respectively.Security analysis shows that the RFID alliance chain model can resist tracking attacks and listing attacks of malicious readers;performance analysis shows that the consensus algorithm after fusing the access control strategy is stable in network and memory consumption,and the throughput increases by about 15%compared with the original algorithm.
Keywords/Search Tags:blockchain, RFID, logistics privacy, consensus algorithm
PDF Full Text Request
Related items