Font Size: a A A

Design And Implementation Of Privacy Protection Algorithm For Identification Internet Of Things

Posted on:2021-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:L M ZhaoFull Text:PDF
GTID:2428330614463949Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Internet of things is called another information industry revolution after computer,Internet and mobile communication network.Internet of things(IOT)is a comprehensive network of sensing things and Internet of things.Various typical sensing technologies are widely used in IOT,such as radio frequency identification(RFID)and wireless sensor network(WSN).RFID plays an important role in the application of Internet of things because of its low cost,excellent performance and non-contact identification.However,in view of the weak storage and computing capacity of RFID tags and the inherent characteristics of wireless communication channel transmission,RFID tags are facing increasing security threats,such as the theft of electronic tag data,the communication intrusion between tags and readers,and the privacy data leakage in the background server.Therefore,the problem of security and privacy protection in RFID system has become the main restriction factor for the widespread application of RFID technology.In this paper,we design and implement the security authentication protocol of RFID identification from the following security issues of RFID system.First of all,in order to improve the security performance of RFID system,the electronic tag will update its unique identity(ID)in real time,and store the ID before and after the update in its own memory,but the storage capacity and computing capacity of the tag are limited,so it can not guarantee the efficiency of updating the tag ID.Secondly,in the process of ID authentication,there are higher requirements for the data storage capacity and computing capacity of RFID background server.At present,there are various typical RFID Security authentication protocol designs,but none of them can solve the above problems well.In this paper,the concept of static ID is put forward,so that the tag does not need to update the ID in real time,so as to solve the cost problem of tag storage and computing power.At the same time,a cross domain authentication protocol design scheme is proposed,so that the storage and computing tasks in the background can be assigned to the cross domain servers,which solves the cost problem of storage and computing power in the background servers.Combined with the above two points,this paper designs a RFID cross domain authentication protocol based on static ID,which has the characteristics of forward security,anti replay attack,anti man in the middle attack,anti location tracking and so on,and effectively solves the problem that the communication data between the tag and the reader is easy to be stolen.At last,this paper proves the cross domain authentication protocol formally and logically,and develops an application program in Android system to simulate the authentication process of RFID tag,reader and background server in etc.The experimental results show that the authentication protocol can effectively solve the problem that tags and reader privacy data are easy to be stolen in RFID system,and effectively solve the storage and calculation problems of the background server in the process of identification authentication,providing theoretical basis and technical reference for the design of authentication interaction protocol of RFID system.
Keywords/Search Tags:Internet of things, Privacy protection, RFID, Authentication protocol, Cross domain
PDF Full Text Request
Related items