Customized Security Protocol of RFID Network in Mobile Internet of Things
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Concerned the problem that the existing RFID security protocols focus on the privacy and anonymity of RFID system, but ignore the scalability and customizability, a scalable and customizable RFID bidirectional authentication protocol is proposed. Firstly, the tags and client readers are authenticated by target authentication module, the efficiency of the authentication is improved by using the tag grouping based on liner search method and a mapping table; secondly, the malicious users are detected by a simple ID matching detection; lastly, the mutual authentication between tags and servers is realized to enhance the security further more. The analysis results show that the proposed algorithm has a good computational efficiency and security, at the same time it realizes the customizability and scalability.

    Reference
    Related
    Cited by
Get Citation

褚贵洋.移动物联网的可定制RFID网络安全协议.计算机系统应用,2017,26(5):193-197

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 23,2016
  • Revised:October 12,2016
  • Adopted:
  • Online: May 13,2017
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063