Font Size: a A A

Research On RFID Security Protocol Based On Internet Of Things

Posted on:2022-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:X Y LiuFull Text:PDF
GTID:2518306740994959Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
RFID(Radio Frequency Identification,RFID)technology is an automatic identification technology used for information acquisition which has been the key technology of Internet of Things.Since RFID has many advantages in comparison with traditional recognition technology,such as high accuracy,high-speed identification,non-contact and anti-interference,so that it is widely used in the fields of logistics transportation,traffic control,asset management,security access control.However,due to communication over the wireless medium,like between RFID tag and the reader,RFID system is vulnerable to eavesdropping,tracking,replay,forgery and other attacks,resulting in data tampering or privacy disclosure.Therefore,it is particularly important to explore effective mechanism to ensure privacy security of the RFID system.Aiming at the above problems,the authentication protocol based on cryptography is studied in this paper.The main work is as follows:Firstly,the research status of RFID technology is summarized in detail,then the communication model,security requirements and threats of RFID system are described systematically.In order to reduce security threats,the physical security mechanism and password protection mechanism are elaborated,and the emphasis is on the advantages and disadvantages of security protocols based on hash function.Secondly,an improved mutual authentication protocol based on hash function is proposed to solve the problem of data synchronization in classical hash protocols.The expected communication delay is set to filter illegal messages,and doublesynchronization strategy is used to dynamically update he label pseudo-identifier and authentication value.Then the security of the improved protocol is analyzed and formally proved by BAN logic.Finally,software testing is carried out to prove that improved protocol meets the low cost and high efficiency security requirements of the RFID system.Finally,an improved authentication protocol is proposed to solve the problem of limited computing resources of passive RFID tags in practical applications.There is no need for the tag to perform any calculation.Dynamically updated tag passwords is used to resist location tracking,and the symmetric encryption algorithm and Hash function could ensure the safety and reliability of the data.Then the security and the correctness of the protocol is analyzed and proved by BAN logic formally.Finally,the medical waste management system based on RFID technology is designed and implemented,and the improved protocol is applied to the medical waste management department for communication security,which proves that the protocol has good usability.
Keywords/Search Tags:Internet of Things, RFID, identity authentication, security protocol, BAN logic
PDF Full Text Request
Related items