Security research and model design of IoT based on RFID

Source: Internet
Author: User
Keywords Internet of Things electronic tags object domain name resolution
Tags analysis authentication based coding content design development development history

Security research and model design of IoT based on RFID

Yi of Shandong University

Based on the research of the development history of the Internet of things, and the analysis and overview of the research on the field of IoT security, the paper puts forward the research topic of the security of the RFID tag Internet. Firstly, some key technologies of IoT, such as RFID tag technology, EPC Coding and network, are analyzed, and the security problems are studied. Then, according to the characteristics of RFID system, a set of two-way authentication protocol based on the derived key and hash function is presented, the content and formal representation of the protocol are described in detail, then the security and reliability of the protocol are compared and the formal proof based on Gny logic is put forward. This paper presents an anonymous transmission authentication protocol based on Third-party authentication server, analyzes its implementation process and verifies the process of anonymity assurance. Through the detailed analysis and research on the two-way authentication protocol based on the derived key and the hash function, the rationality proof based on Gny logic is given, and the correctness and reliability of the authentication protocol are proved. The anonymous transmission authentication protocol based on the third party authentication server also shows a strong applicability, which has a certain enlightening and applicable significance to the security research of IoT.


Security research and model design of IoT based on RFID

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.